US6728779B1 - Method and apparatus for exchanging routing information in a packet-based data network - Google Patents

Method and apparatus for exchanging routing information in a packet-based data network Download PDF

Info

Publication number
US6728779B1
US6728779B1 US09/583,595 US58359500A US6728779B1 US 6728779 B1 US6728779 B1 US 6728779B1 US 58359500 A US58359500 A US 58359500A US 6728779 B1 US6728779 B1 US 6728779B1
Authority
US
United States
Prior art keywords
path
router
history
new
old
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US09/583,595
Inventor
Timothy G. Griffin
Gordon Thomas Wilfong
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia of America Corp
Original Assignee
Lucent Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lucent Technologies Inc filed Critical Lucent Technologies Inc
Priority to US09/583,595 priority Critical patent/US6728779B1/en
Assigned to LUCENT TECHNOLOGIES, INC. reassignment LUCENT TECHNOLOGIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GRIFFIN, TIMOTHY G., WILFONG, GORDON THOMAS
Priority to CA002324837A priority patent/CA2324837A1/en
Priority to EP00310289A priority patent/EP1104963A1/en
Priority to KR1020000072004A priority patent/KR20010070255A/en
Priority to JP2000366453A priority patent/JP2001197105A/en
Assigned to THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT reassignment THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT CONDITIONAL ASSIGNMENT OF AND SECURITY INTEREST IN PATENT RIGHTS Assignors: LUCENT TECHNOLOGIES INC. (DE CORPORATION)
Assigned to JPMORGAN CHASE BANK, AS COLLATERAL AGENT reassignment JPMORGAN CHASE BANK, AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LUCENT TECHNOLOGIES INC.
Publication of US6728779B1 publication Critical patent/US6728779B1/en
Application granted granted Critical
Assigned to LUCENT TECHNOLOGIES INC. reassignment LUCENT TECHNOLOGIES INC. TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS Assignors: JPMORGAN CHASE BANK, N.A. (FORMERLY KNOWN AS THE CHASE MANHATTAN BANK), AS ADMINISTRATIVE AGENT
Assigned to LUCENT TECHNOLOGIES INC. reassignment LUCENT TECHNOLOGIES INC. TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS Assignors: JPMORGAN CHASE BANK, N.A. (FORMERLY KNOWN AS THE CHASE MANHATTAN BANK), AS ADMINISTRATIVE AGENT
Assigned to CREDIT SUISSE AG reassignment CREDIT SUISSE AG SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL-LUCENT USA INC.
Assigned to ALCATEL-LUCENT USA INC. reassignment ALCATEL-LUCENT USA INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CREDIT SUISSE AG
Adjusted expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/033Topology update or discovery by updating distance vector protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery

Definitions

  • This invention relates to packet-based data networks. More particularly, this invention relates to the exchange of routing information between routers in such a network.
  • routers In packet-based data networks such as the Internet, routers “talk” to each other to exchange routing information. Specifically, a router will announce the path it will use to get to a particular destination to each of its peer routers. Each router will thus know the path that its peer routers will take in sending a packet to a particular destination. Routing protocols, running on the routers, are used to exchange such information between routers.
  • a routing protocol can be an Interior Gateway Protocol (IGP) or an Exterior Gateway Protocol (EGP).
  • IGP Interior Gateway Protocol
  • EGP Exterior Gateway Protocol
  • An IGP is used for routing within an administrative domain such as within a corporate backbone network or within a network that is owned by one company and has a unified administrative control over how routing is done.
  • routing is metric-based in that the goal in routing between two points within an administrative domain is to find the route with the lowest cost, where cost may, for example, be distance or some other parameter than can be assigned to a link between routers.
  • Examples of common routing protocols used within an IGP are the Routing Information Protocol (RIP), the Open Shortest Path First (OSPF) protocol, and the Intermediate System to Intermediate System (IS—IS) protocol.
  • RIP Routing Information Protocol
  • OSPF Open Shortest Path First
  • IS—IS Intermediate System to Intermediate System
  • the advantageous property of such IGPs is that they are guaranteed to always achieve a stable routing within the network that is consistent with the network's configuration.
  • the difference between the different routing protocols lies in the nature of the messages passed between routers. Since an IGP is used within a network that is owned or controlled by a single organization, no hostility exists between the owners of the routers within the network that might otherwise affect the willingness of a particular router in another network to accept traffic from a router owned by another.
  • An EGP is used to exchange routing information between autonomous administrative domains.
  • border, or edge, routers that might link, for example, an autonomous AT&T network with an autonomous Sprint network need to communicate via an EGP rather than an IGP.
  • routing between autonomous systems needs to be policy based.
  • Each autonomous system may in fact want to protect itself from being used by others who are not paying for its use.
  • one autonomous system may restrict routing through it from a competitor's system since it doesn't want such competitor's customers to use its resources, even though such routing would be the “shortest” path.
  • EGPs unlike metric-based IGPs, are thus policy based because autonomous systems will not always be able to agree as to the best path to a specified destination.
  • an EGP is much more complicated to administer since it involves expressing a policy of how an administrative domain wants to interact with the rest of the world.
  • Border Gateway Protocol is currently the only interdomain routing protocol employed on the Internet (see, e.g., Y. Rekhter and T. Li, “A border gateway protocol”, RFC 1771 [BGP version 4], 1995; J. W. Stewart, BGP4 , Inter - Domain Routing in the Internet , Addison-Wesley, 1998; and B. Halabi, Internet Routing Architectures , Cisco Press, 1997).
  • the BGP allows each autonomous system to independently formulate its own routing policies, and it allows these policies to override distance metrics in favor of policy concerns.
  • routing policies of autonomous systems can conflict with each other. Inconsistencies in routing policies can result in several problems such as the inability to find a stable routing plan.
  • edge routers between autonomous systems could continue to only exchange information without ever agreeing upon a stable routing plan. Such a situation could in fact have a catastrophic effect in the global Internet resulting in improperly routed traffic, and possibly even causing “gridlock” on the Internet with the amount of routing information being transferred from router to router. The latter could slow the network down to a crawl and, in a worst case situation, cause a “meltdown” of the Internet.
  • an autonomous system on the network has no ability to determine the cause of the routing problems since it only has local information available to it. Even further, even if it did, no one autonomous system has the ability to correct oscillations caused by inconsistency of routing policies between autonomous systems.
  • This new routing protocol referred to herein as the Simple Path Vector Protocol (SPVP)
  • SPVP Simple Path Vector Protocol
  • This additional attribute is a path history which is dynamically computed at each edge router as the routing path to a particular destination is changed. This path history attribute is thus sent by a router to its peers together with the sending router's path to that destination. Protocol oscillations caused by policy conflicts produce paths whose histories contain cycles.
  • a cycle can be identified in the newly computed history and associated with a policy conflict at that receiving edge router's associated autonomous system.
  • the protocol automatically suppresses as a permitted path to that destination those paths whose histories contain cycles.
  • FIG. 1 shows network comprising a group of interconnected nodes, each representing an autonomous system, and the permitted paths to the origin at node 0 from each other node, ordered in preference;
  • FIG. 2 shows a stable path assignment of the network in FIG. 1;
  • FIG. 3 also shows a network comprising a group of interconnected nodes, similar to FIG. 1, with an additional permitted path and preferred path from node 3 , but which solution of path assignments can diverge;
  • FIG. 4 shows a modification of the network in FIG. 3, with a re-ordering of preferred permitted paths to the origin at node 4 , and which has no solution and which will always diverge;
  • FIG. 5 is a block diagram of a router that functions in accordance with the protocol of the present invention.
  • FIGS. 6-7 together show a flow chart detailing the steps of the protocol of the present invention at a particular router.
  • the problem underlying the prior art BGP protocol is what is defined herein as the Stable Paths Problem (SPP).
  • SPP provides a simple semantics for routing policies of vector protocols such as BGP while remaining free of many of the nonessential details.
  • the Stable Paths Problem consists of an undirected graph with a distinguished node called the origin. All other nodes have a set of permitted paths to the origin. Each node also has a ranking function on its permitted paths that indicates an order of preference.
  • a solution to the Stable Paths Problem is an assignment of permitted paths to nodes so that each node's assigned path is its highest ranked path extending any of the assigned paths at its neighbors. Such a solution does not represent a global maximum, but rather an equilibrium point in which each node is assigned its local maximum.
  • peers(u) ⁇ w
  • ⁇ u,w ⁇ E ⁇ is the set of peers for u. It is assumed that node 0 , called the origin, is special in that it is the destination to which all other nodes attempt to establish a path.
  • This notation is most commonly used when P is a path starting with node v and ⁇ u, v ⁇ is an edge in E. In this case (u v) P denotes the path that starts at node u, traverses the edge ⁇ u, v ⁇ , and then follows path P from node v.
  • S (G, A, ⁇ )
  • a path assignment is a function ⁇ that maps each node u ⁇ V to a path ⁇ (u) ⁇ A u . It should be noted that ⁇ (u) may be the empty path.
  • the path assignment ⁇ is stable at node u if:
  • the path assignment ⁇ is stable if it is stable at each node u.
  • the Stable Paths Problem S (G, A, ⁇ ) is solvable if there is a stable path assignment for S.
  • a stable path assignment is called a solution for S. If no such assignment exists, then S is unsolvable.
  • FIG. 1 illustrates a Stable Paths Problem for a 5-node network, the destination node being node 0 .
  • the ranking function for each non-zero node is depicted by the vertical list next to each node, with the highest ranked path being listed first and going down on the list to the lowest ranked non-empty path. The empty path is omitted from each list.
  • the path assignment is depicted by the vertical list next to each node, with the highest ranked path being listed first and going down on the list to the lowest ranked non-empty path. The empty path is omitted from each list.
  • FIG. 2 This is the unique solution to this problem since no other path assignment is stable. For example, the path assignment
  • FIG. 3 A modification of the network in FIG. 1 is shown in FIG. 3 .
  • This arrangement adds one permitted path ( 3 4 2 0 ) for node 3 , yet it has the same unique solution as the network in FIG. 1 .
  • the distributed evaluation of this specification can diverge. By reordering the ranking of paths at node 4 in FIG. 3, the network of FIG. 4 is produced. This specification has no solution and its distributed evaluation will always diverge.
  • SPVP 1 Three Simple Path Vector Protocols (SPVPs) for solving the Stable Paths Problem in a distributed manner are now presented.
  • SPVP 1 is an abstract version of the prior art BGP protocol and represents the state of the art prior to the present invention. This protocol will always diverge when a SPP has no solution. It can also diverge for SPPs that are solvable.
  • the prior art SPVP 1 protocol is then modified in accordance with the present invention by adding a dynamically computed attribute, called the path history, to the routing messages transmitted to neighboring nodes.
  • This protocol in accordance with the present invention, is designated as SPVP 2 .
  • SPVP 2 is not safe.
  • SPVP 2 , SPVP 3 further in accordance with the invention, is safe in that it automatically suppresses paths whose histories contain cycles.
  • the SPVP 1 protocol differs from the simpler model of evaluation presented in the prior art, for example, by the inventors herein in “An analysis of BGP convergent properties”, SIGCOMM '99, 1999; and by B. Halabi, in the aforenoted Internet Routing Architectures .
  • a message processing framework is used herein which employs a reliable FIFO queue of messages for communication between peers.
  • the use of histories in the SPVP 2 and SPVP 3 protocols of the present invention employ message queues that preserve message ordering and ensure no message loss. This is consistent with implementations of the prior art BGP which use TCP and message queues to implement this abstraction.
  • the messages exchanged between peers are simply paths.
  • a node u adopts a path P ⁇ A u it informs each w ⁇ peers(u) by sending path P to w.
  • the path rib(u) is u's current path to the origin.
  • rib-in(u ⁇ w) stores the path sent from w most recently processed at u.
  • the set of path choices available at node u is defined to be
  • This path represents the highest ranked path possible for node u, given the messages received from its peers.
  • a network state is stable if all communication links are empty. It can be shown that the path assignment associated with any stable state is always a stable path assignment, and thus a solution to the Stable Paths Problem S. However, the converse if this theorem indicates that SPVP is not safe. That is, if S has no solution, then SPVP cannot converge to a stable state.
  • the path to the origin from each of the nodes is at an initial state: the path from node 1 to the origin is direct ( 1 0 ), its second preferred choice, the path from node 2 is also direct ( 2 0 ), its second preferred choice, the path from node 3 is via node 4 to node 2 to the origin ( 3 4 2 0 ), its highest preferred choice, and the path from node 4 is via node 2 to the origin ( 4 2 0 ), also its highest preferred choice.
  • node 2 wakes up and sees that node 1 is going directly to the origin. Thus it changes
  • node 4 wakes up and sees that node 2 is no longer going directly to the origin. It therefore cannot use ( 4 2 0 ), nor can it use its second choice ( 4 3 0 ) since node 3 does not go directly to the origin. It is thus assigned the empty path, ⁇ . If a packet were to arrive directed to d at the origin, the packet would be thrown out by its inability to be routed to node 0 .
  • node 3 is fired. Since node 4 is no longer forwarding its traffic to node 0 , node 3 changes its path to the direct path ( 3 0 ), its second choice. At step 4 , node 4 is fired.
  • node 4 Since node 3 is now going directly to the origin, node 4 can get out of its empty state and change its path to ( 4 3 0 ), its second choice.
  • node 1 is fired. Since node 3 is going direct, node 1 can change its path to it first choice ( 1 3 0 ).
  • node 2 is fired. Since node 1 is not going direct anymore, node 2 must change its path to its second choice ( 2 0 ).
  • node 4 is fired. Since node 2 is now going directly to the origin, node 4 can change its path to its first preferred path ( 4 2 0 ).
  • node 3 is fired.
  • node 3 Since node 4 is now going to the origin via node 2 , node 3 changes its path to its first choice ( 3 4 2 0 ). At step 9 , node 1 is fired. Since node 3 is no longer going directly to the origin, node 1 must change its path to its second choice ( 1 0 ). As can be noted, we are now back to the same path assignments that we started with at step 0 . This represents one round of an oscillation.
  • Node 3 's path ( 2 0 ) at step 6 can be explained this way: node 2 adopted path ( 2 0 ) because it went down from ( 2 1 0 ) because node 1 went up to ( 1 3 0 ) because node 3 went down from ( 3 4 2 0 ) because node 4 went down from ( 4 2 0 ) because node 2 went up to ( 2 1 0 ).
  • node 2 adopted path ( 2 0 ) because it went down from ( 2 1 0 ) because node 1 went up to ( 1 3 0 ) because node 3 went down from ( 3 4 2 0 ) because node 4 went down from ( 4 2 0 ) because node 2 went up to ( 2 1 0 ).
  • ⁇ 2 went down from ( 2 1 0 ) because . . . 2 went up to ( 2 1 0 ).
  • P old and P new are paths permitted at node u. Then the event (+, P new ) means that u went up to P new , and the event ( ⁇ , P old ) means that u went down from P old .
  • event e i+1 occurred after event e i , so the most recent event is e k .
  • a path change event such as ( ⁇ , ( 3 4 2 0 )) is written in the simpler form ( ⁇ 3 4 2 0 ).
  • a message m is a pair (P, h) where P is a path and h is a history.
  • P is a path
  • h is a history.
  • the intent is that h describes a sequence of path change events that allowed P to be adopted.
  • the set of choices at node u, choices(u), is now redefined to be
  • This process uses the auxiliary function hist(u) to compute a new path history for P new whenever the best path at node u changes from P old to P new .
  • Table 3 presents a dynamic trace for SPVP 2 that replays the sequence
  • step u best(u) hist(u) 0 1 (10) ⁇ 2 (20) ⁇ 3 (3420) ⁇ 4 (420) ⁇ 1 1 (10) ⁇ 2 ( 210 ) (+210) 3 (3420) ⁇ 4 (420) ⁇ 2 1 (10) ⁇ 2 (210) (+210) 3 (3420) ⁇ 4 ⁇ ( ⁇ 420)(+210) 3 1 (10) ⁇ 2 (210) (+210) 3 ( 30 ) ( ⁇ 3420)( ⁇ 420)(+210) 4 ⁇ ( ⁇ 420)(+210) 4 1 (10) ⁇ 2 (210) (+210) 3 (30) ( ⁇ 3420)( ⁇ 420)(+210) 4 ( 430 ) (+430)( ⁇ 3420)( ⁇ 420)(+210) 5 1 ( 130 ) (+130)( ⁇ 3420)( ⁇ 420)(+210) 2 (210) (+210) 3 (30) ( ⁇ 3420)( ⁇ 420)(+210) 4 (430) (+430)( ⁇ 3420)( ⁇ 420)(+210) 6 1 (130)
  • node 2 has exactly the history previously described.
  • This history can be read as: node 4 went up to ( 4 3 0 ) because node 3 went down from ( 3 4 2 0 ) because node 4 went down from ( 4 2 0 ) because node 2 went up to ( 2 1 0 ).
  • every node contains a cycle in its history. Since the network in FIG. 4 has no solution, these histories would grow in an unbounded manner if the evaluation continued. Note that without the histories, each node would see an oscillation of its path to the origin, but it would not be able to identify this as a policy-based oscillation.
  • SPVP 2 the presence of cycles in path histories is used to alert nodes to the fact that a policy-based oscillation has been dynamically realized.
  • SPVP 3 extends SPVP 2 to a safe protocol by using this information to suppress selected paths, effectively eliminating them from the set of permitted paths. This process of elimination can continue until no protocol oscillation is possible. The resulting solution is then not a solution to the original Stable Paths Problem, but rather to a subproblem.
  • B(u) an additional data structure, B(u) is added to each node. That data structure, B(u) contains a set of bad paths. The definition of the auxiliary function best(u) is then modified so that it never considers paths in the set B(u). Defining choices B (u) to be:
  • the process SPVP 3 is detailed as follows:
  • node 2 In the transition from step 5 to step 6 node 2 first constructs a cycle in the history of path ( 2 0 ),
  • the nodes represent autonomous systems which may each include a plurality of edge routers.
  • Each edge router in an autonomous system communicates with the edge routers in the other autonomous systems as well as the routers that are internal to its own system.
  • each autonomous system includes other computers connected to its internal network.
  • the protocol of the present invention is also applicable for use in other packet-based data networks such as, for example, ATM and frame relay.
  • FIG. 5 a block diagram of an edge router 501 that is running the protocol of the present invention is shown. Shown and described are mainly only those aspects and components of the router that apply to receiving routing messages from its peer routers, acting upon such received messages in accordance with the present invention, and forwarding routing messages to the peer routers.
  • the primary functions of the router viz., forwarding a received packet to its next hop as it progresses towards it addressed destination in accordance with the stored routing for that destination, are not shown nor described since they are not part of the present invention and are obvious to one skilled in the art.
  • Router 501 includes RAM 502 , which includes sub-memory areas 503 - 1 - 503 -N, each of the latter forming a queue for storing successively received routing messages on one of the inputs 504 - 1 - 504 -N from one of the N peer routers of router 501 .
  • Each message indicates, for a particular destination, the current path that that peer router uses to send a packet to that destination.
  • that message further includes the aforedescribed history attribute associated with that path that indicates how that peer arrived at that particular path choice via a series of signed path change events that occurred at it and other routers.
  • each routing message arrives at router 501 from a peer router, it is stored in its appropriate queue in one of the sub-memory areas 503 for subsequent processing by router's processor 505 in accordance with the protocol.
  • the code that realizes the pseudo-code of the SPVP 3 protocol described above is stored in RAM 502 in memory area 506 and is executed by processor 505 .
  • RAM 502 also includes memory area 507 in which is stored a list for each destination of the paths to that destination from this router sorted by this router's preference.
  • a routing table is stored in memory area 508 of RAM 502 , which indicates for each destination, the particular path that an incoming packet to that destination will be directed by that router as well as a history attribute associated with that router.
  • the router will thus send an incoming packet addressed to that destination to an appropriate output port 510 - 1 - 510 -N, which is connected to the one peer router, to which that packet should next be directed.
  • a routing information base (rib) is stored in memory area 511 of RAM 502 , which indicates for each destination what each of the peer routers has chosen as its path to that destination and the history associated with that chosen path.
  • Memory area 512 contains the set of the aforedescribed bad paths, B(u), that the router will not consider as a path to the destination when selecting the most preferred permitted path to that destination.
  • the paths in this set, B(u) are those paths whose associated histories would contain a cycle if such path were chosen. Rather than using a separate memory area, those paths that would yield a cycle in their histories can alternatively be eliminated as choices in memory area 507 , which contains the list of permitted paths in order of their preference.
  • a router such as the router 501 in FIG. 5, as it receives a routing message from a peer router, processes the routing message, and outputs routing messages to its peers, all in accordance with the present invention, are described in connection with the flow chart in FIGS. 6-7.
  • the processor 505 wakes up and chooses a destination and a peer router whose input queue ( 503 - 1 - 503 -N) it will select for examination.
  • the processor determines whether there are any routing messages in that chosen peer's queue for that destination.
  • the oldest routing message for that destination in that peer's queue is chosen and the information from that routing message (the path and the history associated with the path) is put into the routing information base 511 , indexed by the particular peer.
  • every entry in the routing information base for that destination is examined, including the new entry that has just replaced an old entry.
  • the path in each entry represents a path that a peer will take to that destination.
  • the processor goes back to sleep and returns to the beginning to await reawakening again at step 601 .
  • a history for the new path is computed as a function of whether the rank order of the old path is lower, higher, or equal to the rank order of the new permitted path, This history is computed in accordance with Table 2, described above.
  • a determination is made whether there is a cycle in the just computed history. If there is, then, at step 609 , the new path is added to the list of bad paths to that destination and stored in memory area 512 .
  • the highest ranked permitted path remaining in the routing information base, not including the just removed path, is determined.
  • a determination is made whether this newly computed path is different than the original path, P old .
  • step 612 the new history is set to ( ⁇ P old ).
  • a determination is then made, at decision step 613 , whether the newly computed path, P new , is equal to the original path, P old .
  • this same determination is made directly following step 611 if the newly computed path is not different than the original path, P old .
  • the protocol proceeds directly to step 613 to determine whether P new is equal to the original P old .
  • step 613 If, at step 613 , P new is equal to the original P old from any of these three possible input flow-paths, then the routing table need not be updated with a new path and the processor goes back to sleep, at step 606 . However, if P new is determined at step 613 not to be equal to P old , then, at step 614 , the routing table entry for the path between the router and the particular destination is updated with P new and its associated history h new . At step 615 , then, a routing message is sent to each peer router, that indicates for the particular destination, the path this router will thereafter take and the history associated with it.
  • the processor goes back to sleep, at step 606 , to await reawakening again, at step 601 , when a routing message is again chosen for the same or different destination at the same or different input queue of unprocessed routing messages from peer routers.
  • processors may be provided through the use of dedicated hardware as well as hardware capable of executing software in association with appropriate software.
  • the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared.
  • explicit use of the term “processor” should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, read-only memory (ROM) for storing software, random access memory (RAM), and non-volatile storage.
  • DSP digital signal processor
  • ROM read-only memory
  • RAM random access memory
  • non-volatile storage Other hardware, conventional and/or custom, may also be included.
  • any element expressed as a means for performing a specified function is intended to encompass any way of performing that function including, for example, a) a combination of circuit elements which performs that function or b) software in any form, including, therefore, firmware, microcode or the like, combined with appropriate circuitry for executing that software to perform the function.
  • the invention as defined by such claims resides in the fact that the functionalities provided by the various recited means are combined and brought together in the manner which the claims call for. Applicant thus regards any means which can provide those functionalities as equivalent as those shown herein.

Abstract

Routing information is exchanged between edge routers in different autonomous systems that independently define their routing policies. A Simple Path Vector Protocol extends the prior art Border Gateway Protocol in a manner that is guaranteed to converge by adding a new attribute to the routing messages sent by an edge router to its peers in the different systems. This attribute is a path history, which is dynamically computed at each router as the routing path to a particular destination is changed. The path history attribute is sent in a routing message by a router to its peers together with the sending router's path to that destination. By observing the dynamic path history that is computed at a router as a received routing message from a peer router that contains a history attribute is processed, a cycle can be identified in the newly computed history and associated with a policy conflict at that receiving router's associated autonomous system. A path whose history contains a cycle is automatically suppressed as a permitted path to that destination.

Description

CROSS-REFERENCE
This application claims the benefit of U.S. Provisional Application No. 60/168,281, filed Dec. 1, 1999.
TECHNICAL FIELD
This invention relates to packet-based data networks. More particularly, this invention relates to the exchange of routing information between routers in such a network.
BACKGROUND OF THE INVENTION
In packet-based data networks such as the Internet, routers “talk” to each other to exchange routing information. Specifically, a router will announce the path it will use to get to a particular destination to each of its peer routers. Each router will thus know the path that its peer routers will take in sending a packet to a particular destination. Routing protocols, running on the routers, are used to exchange such information between routers. A routing protocol can be an Interior Gateway Protocol (IGP) or an Exterior Gateway Protocol (EGP). An IGP is used for routing within an administrative domain such as within a corporate backbone network or within a network that is owned by one company and has a unified administrative control over how routing is done. Generally such routing is metric-based in that the goal in routing between two points within an administrative domain is to find the route with the lowest cost, where cost may, for example, be distance or some other parameter than can be assigned to a link between routers. Examples of common routing protocols used within an IGP are the Routing Information Protocol (RIP), the Open Shortest Path First (OSPF) protocol, and the Intermediate System to Intermediate System (IS—IS) protocol. The advantageous property of such IGPs is that they are guaranteed to always achieve a stable routing within the network that is consistent with the network's configuration. The difference between the different routing protocols lies in the nature of the messages passed between routers. Since an IGP is used within a network that is owned or controlled by a single organization, no hostility exists between the owners of the routers within the network that might otherwise affect the willingness of a particular router in another network to accept traffic from a router owned by another.
An EGP is used to exchange routing information between autonomous administrative domains. Thus, border, or edge, routers that might link, for example, an autonomous AT&T network with an autonomous Sprint network, need to communicate via an EGP rather than an IGP. Unlike a single autonomous system in which routing can be metric based, routing between autonomous systems needs to be policy based. Each autonomous system may in fact want to protect itself from being used by others who are not paying for its use. Thus, one autonomous system may restrict routing through it from a competitor's system since it doesn't want such competitor's customers to use its resources, even though such routing would be the “shortest” path. EGPs, unlike metric-based IGPs, are thus policy based because autonomous systems will not always be able to agree as to the best path to a specified destination. As a result, an EGP is much more complicated to administer since it involves expressing a policy of how an administrative domain wants to interact with the rest of the world.
The Border Gateway Protocol (BGP) is currently the only interdomain routing protocol employed on the Internet (see, e.g., Y. Rekhter and T. Li, “A border gateway protocol”, RFC 1771 [BGP version 4], 1995; J. W. Stewart, BGP4, Inter-Domain Routing in the Internet, Addison-Wesley, 1998; and B. Halabi, Internet Routing Architectures, Cisco Press, 1997). The BGP allows each autonomous system to independently formulate its own routing policies, and it allows these policies to override distance metrics in favor of policy concerns. However, routing policies of autonomous systems can conflict with each other. Inconsistencies in routing policies can result in several problems such as the inability to find a stable routing plan. Thus, as a change at one router occurs, information is exchanged with its peers that causes a second router to change its routing and exchange information with its peer routers, etc., etc., eventually causing the first router to change its routing again, then the second and so forth. Such a protocol is said to diverge and cause persistent route oscillations. Thus, with the BGP, edge routers between autonomous systems could continue to only exchange information without ever agreeing upon a stable routing plan. Such a situation could in fact have a catastrophic effect in the global Internet resulting in improperly routed traffic, and possibly even causing “gridlock” on the Internet with the amount of routing information being transferred from router to router. The latter could slow the network down to a crawl and, in a worst case situation, cause a “meltdown” of the Internet. Further, an autonomous system on the network has no ability to determine the cause of the routing problems since it only has local information available to it. Even further, even if it did, no one autonomous system has the ability to correct oscillations caused by inconsistency of routing policies between autonomous systems.
SUMMARY OF THE INVENTION
The problems associated with the prior art are solved by the routing protocol of the present invention. This new routing protocol, referred to herein as the Simple Path Vector Protocol (SPVP), extends the BGP by adding a new attribute to the routing messages sent by an edge router to its peers in different autonomous sytems. This additional attribute is a path history which is dynamically computed at each edge router as the routing path to a particular destination is changed. This path history attribute is thus sent by a router to its peers together with the sending router's path to that destination. Protocol oscillations caused by policy conflicts produce paths whose histories contain cycles. By observing the dynamic path history that is computed at an edge router as a received routing message from a peer router that contains a history attribute is processed, a cycle can be identified in the newly computed history and associated with a policy conflict at that receiving edge router's associated autonomous system. In further accord with the present invention, the protocol automatically suppresses as a permitted path to that destination those paths whose histories contain cycles.
BRIEF DESCRIPTION OF THE DRAWING
FIG. 1 shows network comprising a group of interconnected nodes, each representing an autonomous system, and the permitted paths to the origin at node 0 from each other node, ordered in preference;
FIG. 2 shows a stable path assignment of the network in FIG. 1;
FIG. 3 also shows a network comprising a group of interconnected nodes, similar to FIG. 1, with an additional permitted path and preferred path from node 3, but which solution of path assignments can diverge;
FIG. 4 shows a modification of the network in FIG. 3, with a re-ordering of preferred permitted paths to the origin at node 4, and which has no solution and which will always diverge;
FIG. 5 is a block diagram of a router that functions in accordance with the protocol of the present invention; and
FIGS. 6-7 together show a flow chart detailing the steps of the protocol of the present invention at a particular router.
DETAILED DESCRIPTION
The problem underlying the prior art BGP protocol is what is defined herein as the Stable Paths Problem (SPP). The SPP provides a simple semantics for routing policies of vector protocols such as BGP while remaining free of many of the nonessential details. Informally, the Stable Paths Problem consists of an undirected graph with a distinguished node called the origin. All other nodes have a set of permitted paths to the origin. Each node also has a ranking function on its permitted paths that indicates an order of preference. A solution to the Stable Paths Problem is an assignment of permitted paths to nodes so that each node's assigned path is its highest ranked path extending any of the assigned paths at its neighbors. Such a solution does not represent a global maximum, but rather an equilibrium point in which each node is assigned its local maximum.
The concepts are mathematically formalized as follows. A simple, undirected connected graph G=(V, E) represents a network of nodes V={0,1,2, . . . n} connected by edges E. For any node u, peers(u)={w|{u,w}∈E} is the set of peers for u. It is assumed that node 0, called the origin, is special in that it is the destination to which all other nodes attempt to establish a path.
A path in G is either the empty path, denoted ε, or a sequence of nodes, (vk vk−1 . . . v1 v0) such that for each i,k≧i>0, {vi, vi−1} is an edge in E. It is assumed that all non-empty paths P=(vk vk−1 . . . v1 v0) have a direction from the first node vk to the last node v0. Suppose e={u, v} is an edge in E. If P and Q are non-empty paths such that the first node in Q is the same as the last node in P, then PQ denotes the path formed by the concatenation of these paths. This is extended with the convention that εP=Pε=P, for any path P. For example, (4 3 2) (2 1 0) represents the path (4 3 2 1 0), whereas ε(2 1 0) represents the path (2 1 0). This notation is most commonly used when P is a path starting with node v and {u, v} is an edge in E. In this case (u v) P denotes the path that starts at node u, traverses the edge {u, v}, and then follows path P from node v.
For each v∈V−{0}, the set Av denotes the permitted paths from v to the origin (node 0). If P=(v vk . . . v1 0) is in Av then the node vk is called the next hop for path P. Let A={Av|v∈V−{0}} be the set of all permitted paths.
For each v∈V−{0}, there is a non-negative, integer-valued ranking function λv, defined over Av, which represents how node v ranks its permitted paths. If P1, P2∈Av and λv(P1)<λv(P2), then P2 is said to be preferred over P1. Let Λ={λv|v∈V−{0}}.
An instance of the Stable Paths Problem, S=(G, A, Λ), is a graph together with the permitted paths at each non-zero node and the ranking function for each non-zero node, where the following restrictions hold on Λ and A:
1) (empty path is permitted) ε∈Av;
2) (empty path is lowest ranked) λv(ε)=0;
3) (strictness) If λv(P1)=λv(P2), then P1=P2 or there is a u such that P1=(v u)P1′ and P2=(v u)P2′ (paths P1 and P2 have the same next-hop); and
4) (simplicity) If path P∈Av, then P is a simple path (no repeated nodes).
Let S=(G, A, Λ) be an instance of the Stable Paths Problem. Given a node u, suppose that W is a subset of the permitted paths Au such that each path in W has a distinct next hop. Then the maximal path in W, max(u, W), is defined to be: max ( u , W ) = { P W with maximal λ u ( P ) ( W φ ) ɛ o . w .
Figure US06728779-20040427-M00001
A path assignment is a function π that maps each node u∈V to a path π(u)∈Au. It should be noted that π(u) may be the empty path. The set of path choices (u, π) is defined to be all P∈Au such that either P=(u 0) and {u, 0}∈E or P=(u v)π(v) for some {u,v}∈E. The path assignment π is stable at node u if:
π(u)=max(u, choices (u,π))
The path assignment π is stable if it is stable at each node u. A path assignment can be written as a vector, (P1, P2, . . . , Pn), where π(u)=Pu.
The Stable Paths Problem S=(G, A, Λ) is solvable if there is a stable path assignment for S. A stable path assignment is called a solution for S. If no such assignment exists, then S is unsolvable.
FIG. 1 illustrates a Stable Paths Problem for a 5-node network, the destination node being node 0. The ranking function for each non-zero node is depicted by the vertical list next to each node, with the highest ranked path being listed first and going down on the list to the lowest ranked non-empty path. The empty path is omitted from each list. The path assignment
((1 3 0), (2 0), (3 0), (4 3 0))
is illustrated in FIG. 2. This is the unique solution to this problem since no other path assignment is stable. For example, the path assignment
π=((1 0), (2 0), (3 0), (4 3 0))
is not stable since it is not stable for nodes 1 and 2. This can be seen by noting that
choices(1, π)={(1 0), (1 3 0)}
choices(2, π)={(2 0), (2 1 0)}
and so max(1, choices(1,π))=(1 3 0)@π(1) and max(1, choices(2,π))=(2 1 0)≠π(2).
A modification of the network in FIG. 1 is shown in FIG. 3. This arrangement adds one permitted path (3 4 2 0) for node 3, yet it has the same unique solution as the network in FIG. 1. As will be later explained, the distributed evaluation of this specification can diverge. By reordering the ranking of paths at node 4 in FIG. 3, the network of FIG. 4 is produced. This specification has no solution and its distributed evaluation will always diverge.
Three Simple Path Vector Protocols (SPVPs) for solving the Stable Paths Problem in a distributed manner are now presented. The first, SPVP1, is an abstract version of the prior art BGP protocol and represents the state of the art prior to the present invention. This protocol will always diverge when a SPP has no solution. It can also diverge for SPPs that are solvable. The prior art SPVP1 protocol is then modified in accordance with the present invention by adding a dynamically computed attribute, called the path history, to the routing messages transmitted to neighboring nodes. This protocol, in accordance with the present invention, is designated as SPVP2. SPVP2 is not safe. However, policy oscillations caused by policy conflicts produce paths whose histories contain “event cycles.” These cycles identify the policy conflicts and the network nodes involved. An extension to SPVP2, SPVP3, further in accordance with the invention, is safe in that it automatically suppresses paths whose histories contain cycles.
The SPVP1 protocol differs from the simpler model of evaluation presented in the prior art, for example, by the inventors herein in “An analysis of BGP convergent properties”, SIGCOMM'99, 1999; and by B. Halabi, in the aforenoted Internet Routing Architectures. A message processing framework is used herein which employs a reliable FIFO queue of messages for communication between peers. The use of histories in the SPVP2 and SPVP3 protocols of the present invention employ message queues that preserve message ordering and ensure no message loss. This is consistent with implementations of the prior art BGP which use TCP and message queues to implement this abstraction.
In SPVP1, the messages exchanged between peers are simply paths. When a node u adopts a path P∈Au it informs each w∈peers(u) by sending path P to w. There are two data structures at each node u. The path rib(u) is u's current path to the origin. For each w∈peers(u), rib-in(u←w) stores the path sent from w most recently processed at u. The set of path choices available at node u is defined to be
choices(u)={(u w)P∈Au|P=rib-in(u←w)},
and the best possible path at u is defined to be
best(u)=max(u, choices(u)).
This path represents the highest ranked path possible for node u, given the messages received from its peers.
The process spvp1[u] that runs at each node u is as follows:
process spvp1[u]
begin
receive P from w →
begin
rib-in (u  w) := P
if rib(u) ≠ best(u) then
begin
rib(u) := best(u)
for each v ∈ peers(u) do
begin
send rib(u) to v
end
end
end
end
The notation and semantics are similar to that used by M. G. Gouda in Elements of Network Protocol Design, John Wiley & Sons, Inc., 1998. If there is an unprocessed message from any w∈peers(u), the guard receive P from w can be activated causing the message to be deleted from the incoming communication link and processed according to the program to the right of the arrow (→). It is assumed that this program is executed in one atomic step and that the communication channels are reliable and preserve message order. This protocol ensures that rib-in(u←w) always contains the most recently processed message from peer w and that rib(u) is always the highest ranked path that u can adopt that is consistent with these paths.
The network state of the system is the collection of values rib(u), rib-in(u←w), and the state of all communication links. It should be clear than any network state implicitly defines the path assignment π(u)=rib(u). A network state is stable if all communication links are empty. It can be shown that the path assignment associated with any stable state is always a stable path assignment, and thus a solution to the Stable Paths Problem S. However, the converse if this theorem indicates that SPVP is not safe. That is, if S has no solution, then SPVP cannot converge to a stable state.
If the network in FIG. 4 is considered using SPVP1, a sequence of network states can be constructed that are associated with the path assignments in Table 1 below. In Table 1, an underlined path indicates that it has changed from the previous path assignment. Thus, at step 0, the path to the origin from each of the nodes is at an initial state: the path from node 1 to the origin is direct (1 0), its second preferred choice, the path from node 2 is also direct (2 0), its second preferred choice, the path from node 3 is via node 4 to node 2 to the origin (3 4 2 0), its highest preferred choice, and the path from node 4 is via node 2 to the origin (4 2 0), also its highest preferred choice. At step 1, node 2 wakes up and sees that node 1 is going directly to the origin. Thus it changes
TABLE 1
step π
0 (10) (20) (3420) (420)
1 (10) (210) (3420) (420)
2 (10) (210) (3420) ε
3 (10) (210) (30) ε
4 (10) (210) (30) (430)
5 (130) (210) (30) (430)
6 (130) (20) (30) (420)
7 (130) (20) (3420) (420)
8 (130) (20) (3420) (420)
9 (10) (20) (3420) (420)
its path to (2 1 0), which is its preferred path. At step 2, node 4 wakes up and sees that node 2 is no longer going directly to the origin. It therefore cannot use (4 2 0), nor can it use its second choice (4 3 0) since node 3 does not go directly to the origin. It is thus assigned the empty path, ε. If a packet were to arrive directed to d at the origin, the packet would be thrown out by its inability to be routed to node 0. At step 3, node 3 is fired. Since node 4 is no longer forwarding its traffic to node 0, node 3 changes its path to the direct path (3 0), its second choice. At step 4, node 4 is fired. Since node 3 is now going directly to the origin, node 4 can get out of its empty state and change its path to (4 3 0), its second choice. At step 5, node 1 is fired. Since node 3 is going direct, node 1 can change its path to it first choice (1 3 0). At step 6, node 2 is fired. Since node 1 is not going direct anymore, node 2 must change its path to its second choice (2 0). At step 7, node 4 is fired. Since node 2 is now going directly to the origin, node 4 can change its path to its first preferred path (4 2 0). At step 8, node 3 is fired. Since node 4 is now going to the origin via node 2, node 3 changes its path to its first choice (3 4 2 0). At step 9, node 1 is fired. Since node 3 is no longer going directly to the origin, node 1 must change its path to its second choice (1 0). As can be noted, we are now back to the same path assignments that we started with at step 0. This represents one round of an oscillation.
It should be noted that even if a solution exists, SPVP1 is not guaranteed to converge. Such a sequence of states can also be constructed for the network in FIG. 3, which has a solution. Whereas the network in FIG. 4 is unable to exit this oscillation, the network in FIG. 3 can oscillate for an arbitrary amount of time before converging on a solution. In other words, the network of FIG. 3 can produce both persistent and transient oscillations.
In Table 1, the sequence of events that led node 2 to adopt the path (2 0) at step 6 can be explained as follows. Suppose that node u transitions from rib(u)=Pold to rib(u)=Pnew. We say that node u went down from Pold if u ranks path Pnew lower than path Pold. Similarly, we say that node u went up to path Pnew if u ranks path Pold lower than path Pnew. Node 3's path (2 0) at step 6 can be explained this way: node 2 adopted path (2 0) because it went down from (2 1 0) because node 1 went up to (1 3 0) because node 3 went down from (3 4 2 0) because node 4 went down from (4 2 0) because node 2 went up to (2 1 0). Thus, it can be seen that there is a circularity involved −2 went down from (2 1 0) because . . . 2 went up to (2 1 0).
A path change event is defined to be a pair e=(s, P) where s∈{+, −} is the sign of e and P is a path. If e is a path change event, then sign (e) denotes the sign of e. Suppose Pold and Pnew are paths permitted at node u. Then the event (+, Pnew) means that u went up to Pnew, and the event (−, Pold) means that u went down from Pold. A path history h is either the empty history ⋄, or a sequence h=ek ek−1 . . . e1, where each ei is a path change event. Intuitively, event ei+1 occurred after event ei, so the most recent event is ek. Such a history contains a cycle if there exists i,j, with k≧j>i≧1, such that ei=(si, P) and ej=(s2, P). For ease of notation, a path change event such as (−, (3 4 2 0)) is written in the simpler form (− 3 4 2 0).
Using this notation the explanation for the path (2 0) at node 2 can be restated as:
(− 2 1 0) (+ 1 3 0) (− 3 4 2 0) (− 4 2 0) (+ 2 1 0).
This history is noted to contain a cycle.
The prior art SPVP1 is now extended to the present invention's SPVP2, which dynamically computes such histories in a distributed manner. A message m is a pair (P, h) where P is a path and h is a history. The intent is that h describes a sequence of path change events that allowed P to be adopted. For any message m=(P, h), define path(m)=P and history(m)=h. The set of choices at node u, choices(u), is now redefined to be
{(u w)P∈Au|P=path(rib-in(u←w))}.
Similarly, the path assignment associated with a network state is now π(u)=path(rib(u)).
The process spvp2[u] that implements SPVP2 at node u is as follows:
process spvp2[u]
begin
receive m from w →
begin
rib-in(u  w) := m
if path(rib(u)) ≠ bestB(u) then
begin
Pold := path(rib(u))
Pnew := best(u)
hnew := hist(u)
rib(u) := (Pnew, hnew)
for each v ∈ peers(u) do
begin
send rib(u) to v
end
end
end
end
This process uses the auxiliary function hist(u) to compute a new path history for Pnew whenever the best path at node u changes from Pold to Pnew. This function is defined in Table 2. If u goes up to Pnew=(u w)P2, then the history
TABLE 2
hist(u) condition
(+, Pnew) h if λu(Pold) < λu(Pnew),
Pnew = (u w)P2, and
rib-in(u  w) = (P2, h),
(−, Pold) h if λu(Pold) > λu(Pnew),
Pold = (u w)P1,
rib-in(u  w) = (P2, h),
(s, Q) h if λu(Pold) = λu(Pnew),
Pold = (u w)P1,
Pnew = (u w)P2,
rib-in(u  w) = (P2, h),
h = e h′,
s = sign (e), and
Pold if s = −
Q =
Pnew if s = +
of this path at u is (+, Pnew)h, where h is the history of P2 received from w explaining why w adopted P2, P2 being a specific sub-path of the new path from peer w to the destination and Pnew being an extension of that sub-path from u to the destination. If u goes down from Pold=(u w)P1, then the history of the new path at u is (−, Pold)h, where h is the history of the most recent path from w explaining why w abandoned P1, P1 being a specific sub-path of the old path from peer w to the destination and Pold being the extension of that sub-path from u to the destination. Finally, if u changes paths to one of equal rank, then both paths must be from the same peer w. (This follows from the strictness condition imposed on ranking functions described above.) Node u generates a path change event (s, Q), where the sign s is taken from the most recent message received from w. The path Q is chose to be consistent with this sign in the following sense. If s=−, then w went down, and u will agree with w and generate the event (−, Pold). If s=+, the w went up, and again u will agree with w and generate the event (+, Pnew). This is just one of many ways of handling the case where the rank order of the new path is equal to the rank order of the old path.
Table 3 presents a dynamic trace for SPVP2 that replays the sequence
TABLE 3
step u best(u) hist(u)
0 1 (10)
2 (20)
3 (3420)
4 (420)
1 1 (10)
2 (210) (+210)
3 (3420)
4 (420)
2 1 (10)
2 (210) (+210)
3 (3420)
4 ε (−420)(+210)
3 1 (10)
2 (210) (+210)
3 (30) (−3420)(−420)(+210)
4 ε (−420)(+210)
4 1 (10)
2 (210) (+210)
3 (30) (−3420)(−420)(+210)
4 (430) (+430)(−3420)(−420)(+210)
5 1 (130) (+130)(−3420)(−420)(+210)
2 (210) (+210)
3 (30) (−3420)(−420)(+210)
4 (430) (+430)(−3420)(−420)(+210)
6 1 (130) (+130)(−3420)(−420)(+210)
2 (20) (−210)(+130)(−3420)(−420)(+210)
3 (30) (−3420)(−420)(+210)
4 (430) (+430)(−3420)(−420)(+210)
7 1 (130) (+130)(−3420)(−420)(+210)
2 (20) (−210)(+130)(−3420)(−420)(+210)
3 (30) (−3420)(−420)(+210)
4 (420) (+420)(−210)(+130)(−3420)(−420)(+210)
8 1 (130) (+130)(−3420)(−420)(+210)
2 (20) (−210)(+130)(−3420)(−420)(+210)
3 (3420) (+3420)(+420)(−210)(+130)(−3420)(−420)(+210)
4 (420) (+420)(−210)(+130)(−3420)(−420)(+210)
9 1 (10) (−130)(+3420)(+420)(−210)(+130)(−3420)(−420)
2 (20) (+210)
3 (3420) (−210)(+130)(−3420)(−420)(+210)
4 (420) (+3420)(+420)(−210)(+130)(−3420)(−420)(+210)
(+420)(−210)(+130)(−3420)(−420)(+210)
presented above in Table 1 for the network in FIG. 4. The column best(u) indicates the route chosen as the best route for that u. At step 6, node 2 has exactly the history previously described. For another example, at step 4, rib(4)=((4 3 0), h), where h=(+ 4 3 0) (− 3 4 2 0) (− 4 2 0) (+ 2 1 0). This history can be read as: node 4 went up to (4 3 0) because node 3 went down from (3 4 2 0) because node 4 went down from (4 2 0) because node 2 went up to (2 1 0).
At step 9 every node contains a cycle in its history. Since the network in FIG. 4 has no solution, these histories would grow in an unbounded manner if the evaluation continued. Note that without the histories, each node would see an oscillation of its path to the origin, but it would not be able to identify this as a policy-based oscillation.
Using SPVP2, the presence of cycles in path histories is used to alert nodes to the fact that a policy-based oscillation has been dynamically realized. SPVP3 extends SPVP2 to a safe protocol by using this information to suppress selected paths, effectively eliminating them from the set of permitted paths. This process of elimination can continue until no protocol oscillation is possible. The resulting solution is then not a solution to the original Stable Paths Problem, but rather to a subproblem.
Several approaches are possible. In an exemplary approach, an additional data structure, B(u), is added to each node. That data structure, B(u) contains a set of bad paths. The definition of the auxiliary function best(u) is then modified so that it never considers paths in the set B(u). Defining choicesB(u) to be:
{(u w)P∈(Au−B(u))|P∈rib-in(u←w)} and
bestB(u)=max(u, choicesB(u)).
SPVP2 is then modified so that if u would construct a history containing a cycle for path Pnew=bestB(u), then it adds path Pnew to the set B(u) and recomputes Pnew=bestB(u) with this modified B(u). If Pnew≠Pold, then u must have gone down from Pold. In this case, the history of a new path is truncated to (−, Pold) to ensure that the resulting history does not contain a cycle. The process SPVP3 is detailed as follows:
process spvp3[u]
begin
receive m from w →
begin
rib-in(u  w) := m
if path(rib(u)) ≠ bestB(u) then
begin
Pold := path(rib(u))
Pnew = bestB(u)
hnew := hist(u)
if hnew contains a cycle then
begin
B(u) := B(u) U {Pnew}
Pnew := bestB(u)
if Pnew ≠ Pold then
begin
hnew := (−, Pold)
end
end
if Pnew ≠ Pold then
begin
rib(u) := (Pnew, hnew)
for each V ∈ peers(u) do
begin
send rib(u) to v
end
end
end
end
end
For the evaluation of the network in FIG. 4 presented above in Table 3, this results in convergence to the path assignment
((1 3 0), ε, (3 0), (4 3 0)).
In the transition from step 5 to step 6 node 2 first constructs a cycle in the history of path (2 0),
(− 2 1 0) (+ 1 3 0) (− 3 4 2 0) (− 4 2 0) (+ 2 1 0).
Because of this it adds path (2 0) to its set of bad paths B(2). It then adopts the empty path, which results in a stable state. This is exactly the solution to the Stable Paths Problem obtained from the network in FIG. 4 by deleting path (2 0) from the set of permitted paths.
As described hereinabove, the nodes represent autonomous systems which may each include a plurality of edge routers. Each edge router in an autonomous system communicates with the edge routers in the other autonomous systems as well as the routers that are internal to its own system. In addition to a plurality of internal routers, each autonomous system includes other computers connected to its internal network. Although the terminology used above applies to the IP world, the protocol of the present invention is also applicable for use in other packet-based data networks such as, for example, ATM and frame relay.
With reference to FIG. 5, a block diagram of an edge router 501 that is running the protocol of the present invention is shown. Shown and described are mainly only those aspects and components of the router that apply to receiving routing messages from its peer routers, acting upon such received messages in accordance with the present invention, and forwarding routing messages to the peer routers. The primary functions of the router, viz., forwarding a received packet to its next hop as it progresses towards it addressed destination in accordance with the stored routing for that destination, are not shown nor described since they are not part of the present invention and are obvious to one skilled in the art. Router 501 includes RAM 502, which includes sub-memory areas 503-1-503-N, each of the latter forming a queue for storing successively received routing messages on one of the inputs 504-1-504-N from one of the N peer routers of router 501. Each message indicates, for a particular destination, the current path that that peer router uses to send a packet to that destination. In addition, and in accordance with the present invention described above, that message further includes the aforedescribed history attribute associated with that path that indicates how that peer arrived at that particular path choice via a series of signed path change events that occurred at it and other routers. As each routing message arrives at router 501 from a peer router, it is stored in its appropriate queue in one of the sub-memory areas 503 for subsequent processing by router's processor 505 in accordance with the protocol. The code that realizes the pseudo-code of the SPVP3 protocol described above is stored in RAM 502 in memory area 506 and is executed by processor 505. RAM 502 also includes memory area 507 in which is stored a list for each destination of the paths to that destination from this router sorted by this router's preference. A routing table is stored in memory area 508 of RAM 502, which indicates for each destination, the particular path that an incoming packet to that destination will be directed by that router as well as a history attribute associated with that router. The router will thus send an incoming packet addressed to that destination to an appropriate output port 510-1-510-N, which is connected to the one peer router, to which that packet should next be directed. Further, a routing information base (rib) is stored in memory area 511 of RAM 502, which indicates for each destination what each of the peer routers has chosen as its path to that destination and the history associated with that chosen path. Memory area 512 contains the set of the aforedescribed bad paths, B(u), that the router will not consider as a path to the destination when selecting the most preferred permitted path to that destination. As previously described, the paths in this set, B(u), are those paths whose associated histories would contain a cycle if such path were chosen. Rather than using a separate memory area, those paths that would yield a cycle in their histories can alternatively be eliminated as choices in memory area 507, which contains the list of permitted paths in order of their preference.
The functions of a router such as the router 501 in FIG. 5, as it receives a routing message from a peer router, processes the routing message, and outputs routing messages to its peers, all in accordance with the present invention, are described in connection with the flow chart in FIGS. 6-7. At step 601, the processor 505 wakes up and chooses a destination and a peer router whose input queue (503-1-503-N) it will select for examination. At step 602, the processor determines whether there are any routing messages in that chosen peer's queue for that destination. At step 603, the oldest routing message for that destination in that peer's queue is chosen and the information from that routing message (the path and the history associated with the path) is put into the routing information base 511, indexed by the particular peer. At step 604, every entry in the routing information base for that destination is examined, including the new entry that has just replaced an old entry. The path in each entry represents a path that a peer will take to that destination. By prepending the current router to each of the paths in the routing information base to that destination, all possible routes to that destination are determined. Not each of those paths, however, is a permitted path in accordance with this router's stored rank-ordered list of permitted paths 507. At this step 604, from among only those paths that are permitted and excluding the bad paths previously determined and stored in the bad path memory area 512, the highest ranked path in the routing information base is chosen. At step 605, a determination is made whether that highest ranked permitted path (Pnew) is different than the old path (Pold) that the router had in its routing table for that destination. If it is not different, then, at step 606, the processor goes back to sleep and returns to the beginning to await reawakening again at step 601. If Pnew is different than Pold, then, at step 607, a history for the new path is computed as a function of whether the rank order of the old path is lower, higher, or equal to the rank order of the new permitted path, This history is computed in accordance with Table 2, described above. At step 608, a determination is made whether there is a cycle in the just computed history. If there is, then, at step 609, the new path is added to the list of bad paths to that destination and stored in memory area 512. At step 610, the highest ranked permitted path remaining in the routing information base, not including the just removed path, is determined. At decision step 611, a determination is made whether this newly computed path is different than the original path, Pold. If it is different, then at step 612, the new history is set to (− Pold). A determination is then made, at decision step 613, whether the newly computed path, Pnew, is equal to the original path, Pold. Similarly, this same determination, at step 613, is made directly following step 611 if the newly computed path is not different than the original path, Pold. Further, if, at step 608, no cycle is found in the history computed at step 607, then the protocol proceeds directly to step 613 to determine whether Pnew is equal to the original Pold. If, at step 613, Pnew is equal to the original Pold from any of these three possible input flow-paths, then the routing table need not be updated with a new path and the processor goes back to sleep, at step 606. However, if Pnew is determined at step 613 not to be equal to Pold, then, at step 614, the routing table entry for the path between the router and the particular destination is updated with Pnew and its associated history hnew. At step 615, then, a routing message is sent to each peer router, that indicates for the particular destination, the path this router will thereafter take and the history associated with it. Once these routing messages are sent, the processor goes back to sleep, at step 606, to await reawakening again, at step 601, when a routing message is again chosen for the same or different destination at the same or different input queue of unprocessed routing messages from peer routers.
The foregoing merely illustrates the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements which, although not explicitly described or shown hereinabove, embody the principles of the invention and are included within its spirit and scope. Furthermore, all examples and conditional language that have been recited herein are principally intended expressly to be only for pedagogical purposes to aid the reader in understanding the principles of the invention and the concepts contributed by the inventors to furthering the art, and are intended to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements that have been made herein reciting principles, aspects, and embodiments of the invention, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future, i.e., any elements developed that perform the same function, regardless of structure.
Thus, for example, it will be appreciated by those skilled in the art that the block diagram of the router used herein represents a conceptual views of illustrative circuitry embodying the principles of the invention. Similarly, it will be appreciated that the flow charts and pseudocode that have been used herein represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor.
The functions of the various elements shown in the FIGS., including functional blocks labeled as “processors” may be provided through the use of dedicated hardware as well as hardware capable of executing software in association with appropriate software. When provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared. Moreover, explicit use of the term “processor” should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, read-only memory (ROM) for storing software, random access memory (RAM), and non-volatile storage. Other hardware, conventional and/or custom, may also be included.
In the claims hereof any element expressed as a means for performing a specified function is intended to encompass any way of performing that function including, for example, a) a combination of circuit elements which performs that function or b) software in any form, including, therefore, firmware, microcode or the like, combined with appropriate circuitry for executing that software to perform the function. The invention as defined by such claims resides in the fact that the functionalities provided by the various recited means are combined and brought together in the manner which the claims call for. Applicant thus regards any means which can provide those functionalities as equivalent as those shown herein.

Claims (26)

The invention claimed is:
1. A method at a first router comprising:
a) selecting for processing a routing message received from one peer router from among a group of a plurality of peer routers of the first router, the routing message comprising a path from the peer router to a destination end router and an associated path history associated with that path, the path history indicating a sequence of any number of path change events that allowed the one peer router to adopt that path;
b) determining a new path from the first router to the destination end router from a set of stored paths to the destination end router and the path in the routing message;
c) dynamically computing a new path history associated with the determined new path; and
d) sending the determined new path and its associated new path history to one or more of the plurality of peer routers.
2. The method of claim 1 wherein determining the new path comprises choosing as the new path the highest ranked permitted path from the first router to the destination end router from a rank-ordered set of permitted paths, and determining whether that new path is different than the old path from the first router to the destination end router.
3. The method of claim 2 wherein when the new path is determined to be different than the old path, dynamically computing the history of the new path as a function of whether the rank order of the new path is lower, higher, or equal to the rank order of the old path.
4. The method of claim 3 wherein when the rank order of the old path is lower than the rank order of the new path, then the history of the new path is a combination of a signed new path with a path history, the sign indicating that the new path is ranked higher than the old path and the path history indicating a sequence of events that led to the one peer router to adopt a specific sub-path of the new path.
5. The method of claim 3 wherein when the rank order of the old path is higher than the rank order of the new path, then the history of the new path is a combination of a signed old path with a path history, the sign indicating that the new path is ranked lower than the old path and the path history indicating a sequence of events that led to the one peer router to abandon a specific sub-path of the old path.
6. The method of claim 1 further comprising,
e) after dynamically computing the new path history, determining whether there is a cycle present in the new path history determined in step b).
7. The method of claim 6 further comprising, when in step e) a cycle is determined to be present in the new path history determined in step b):
f) determining a newer path from the first router to the destination end router from the set of stored paths to the destination and the path in the routing message, which excludes as being the newer path the new path determined in step b) which associated path history was determined in step e) to contain the cycle.
8. The method of claim 7 further comprising determining whether the newer path determined in step f) is different than the original old path, and when it is different, setting the history of the newer path determined in step f) to a function of the history of the original old path.
9. The method of claim 1 wherein the routing message selected for processing from the one peer router is the oldest unprocessed received routing message from the one peer router.
10. A router comprising:
means for selecting for processing a routing message received from one peer router from among a group of a plurality of peer routers of the first router, the routing message comprising a path from the peer router to a destination end router and an associated path history associated with that path, the path history indicating a sequence of any number of path change events that allowed the one peer router to adopt that path;
means for determining a new path from the first router to the destination end router from a set of stored paths to the destination end router and the path in the routing message; and
means for dynamically computing a new path history associated with the determined new path.
11. The router of claim 10 wherein the means for determining the new path comprises means for choosing as the new path the highest ranked permitted path from the first router to the destination end router from a rank-ordered set of permitted paths, and means for determining whether the new path is different than the old path from the first router to the destination end router.
12. The router of claim 11 wherein when the new path is determined to be different than the old path, then the means for dynamically computing the new path history computes the history as a function of whether the rank order of the new path is lower, higher, or equal to the rank order of the old path.
13. The router of claim 12 wherein when the rank order of the old path is lower than the rank order of the new path, then the history of the new path is a combination of a signed new path with a path history, the sign indicating that the new path is ranked higher than the old path and the path history indicating a sequence of events that led to the one peer router to adopt a specific sub-path of the new path.
14. The router of claim 12 wherein when the rank order of the old path is higher than the rank order of the new path, then the history of the new path is a combination of a signed old path with a path history, the sign indicating that the new path is ranked lower than the old path and the path history indicating a sequence of events that led to the one peer router to abandon a specific sub-path of the old path.
15. The router of claim 10 further comprising means for determining whether there is a cycle in the new path history.
16. The router of claim 15 wherein when a cycle is determined to be present in the new path history, then the means for determining a new path determines a newer path from the router to the destination end router from the set of stored paths to the destination and the path in the selected received routing message from the one peer router, which excludes as being the newer path the new path which associated path history was determined to contain the cycle.
17. The router of claim 10 wherein the routing message selected for processing from the one peer router is the oldest unprocessed received routing message from the one peer router.
18. A computer readable media tangibly embodying a program of instructions executable by a computer to perform at a first router a method for exchanging routing information with a group of a plurality of peer routers, the method comprising:
a) selecting for processing a routing message received from one of the peer routers, the routing message comprising a path from the peer router to a destination end router and an associated path history associated with that path, the path history indicating a sequence of any number of path change events that allowed the one peer router to adopt that path;
b) determining a new path from the first router to the destination end router from a set of stored paths to the destination end router and the path in the routing message;
c) dynamically computing a new path history associated with the determined new path; and
d) sending the determined new path and its associated new path history to one or more of the plurality of peer routers.
19. The media of claim 18 wherein in the method determining the new path comprises choosing as the new path the highest ranked permitted path from the first router to the destination end router from a rank-ordered set of permitted paths, and determining whether that new path is different than the old path from the first router to the destination end router.
20. The media of claim 19 wherein in the method when the new path is determined to be different than the old path, dynamically computing the history of the new path as a function of whether the rank order of the new path is lower, higher, or equal to the rank order of the old path.
21. The media of claim 20 wherein in the method when the rank order of the old path is lower than the rank order of the new path, then the history of the new path is a combination of a signed new path with a path history, the sign indicating that the new path is ranked higher than the old path and the path history indicating a sequence of events that led to the one peer router to adopt a specific sub-path of the new path.
22. The media of claim 20 wherein in the method when the rank order of the old path is higher than the rank order of the new path, then the history of the new path is a combination of a signed old path with a path history, the sign indicating that the new path is ranked lower than the old path and the path history indicating a sequence of events that led to the one peer router to abandon a specific sub-path of the old path.
23. The media of claim 18 wherein the method further comprises,
e) after dynamically computing the new path history, determining whether there is a cycle present in the new path history.
24. The media of claim 23 wherein the method further comprises,
f) when a cycle is determined to be present in the new path history, determining a newer path from the first router to the destination end router from the set of stored paths to the destination end router and the path in the routing message, which excludes as being the newer path the new path determined in step b) which associated path history was determined in step c) to contain the cycle.
25. The media of claim 24 wherein the method further comprises determining whether the newer path is different than the original old path, and when it is different, setting the history of the newer path to a function of the history of the original old path.
26. The media of claim 18 wherein in the method the routing message selected for processing from the one peer router is the oldest unprocessed received routing message from the one peer router.
US09/583,595 1999-12-01 2000-05-31 Method and apparatus for exchanging routing information in a packet-based data network Expired - Fee Related US6728779B1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US09/583,595 US6728779B1 (en) 1999-12-01 2000-05-31 Method and apparatus for exchanging routing information in a packet-based data network
CA002324837A CA2324837A1 (en) 1999-12-01 2000-10-30 Method and apparatus for exchanging routing information in a packet-based data network
EP00310289A EP1104963A1 (en) 1999-12-01 2000-11-20 Method and apparatus for exchanging routing information in a packet-based data network
KR1020000072004A KR20010070255A (en) 1999-12-01 2000-11-30 Method and apparatus for exchanging routing information in a packet-based data network
JP2000366453A JP2001197105A (en) 1999-12-01 2000-12-01 Method and device for exchanging routing information on packet data network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16828199P 1999-12-01 1999-12-01
US09/583,595 US6728779B1 (en) 1999-12-01 2000-05-31 Method and apparatus for exchanging routing information in a packet-based data network

Publications (1)

Publication Number Publication Date
US6728779B1 true US6728779B1 (en) 2004-04-27

Family

ID=26863946

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/583,595 Expired - Fee Related US6728779B1 (en) 1999-12-01 2000-05-31 Method and apparatus for exchanging routing information in a packet-based data network

Country Status (5)

Country Link
US (1) US6728779B1 (en)
EP (1) EP1104963A1 (en)
JP (1) JP2001197105A (en)
KR (1) KR20010070255A (en)
CA (1) CA2324837A1 (en)

Cited By (64)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020075813A1 (en) * 2000-10-17 2002-06-20 Baldonado Omar C. Method and apparatus for coordinating routing parameters via a back-channel communication medium
US20020078223A1 (en) * 2000-10-17 2002-06-20 Baldonado Omar C. Method and apparatus for performance and cost optimization in an internetwork
US20020129161A1 (en) * 2000-10-17 2002-09-12 Lloyd Michael A. Systems and methods for robust, real-time measurement of network performance
US20020165981A1 (en) * 2000-06-28 2002-11-07 Erol Basturk Method and apparatus for establishing and sharing a virtual change notification list among a plurality of peer nodes
US20020184393A1 (en) * 2000-10-17 2002-12-05 Leddy John G. Routing information exchange
US20030110230A1 (en) * 2001-12-12 2003-06-12 International Business Machines Corporation Method and system for preserving message order when parallel processing messages
US20030149694A1 (en) * 2002-02-05 2003-08-07 Ibm Corporation Path-based ranking of unvisited web pages
US20030161321A1 (en) * 2000-10-17 2003-08-28 Karam Mansour J. Method and apparatus for characterizing the quality of a network path
US20040205098A1 (en) * 2000-10-17 2004-10-14 Lloyd Michael A. Load optimization
US6857026B1 (en) * 1999-12-14 2005-02-15 Nortel Networks Limited Using alternate routes for fail-over in a communication network
US20060072543A1 (en) * 2004-09-09 2006-04-06 Lloyd Michael A Methods of and systems for remote outbound control
US7036051B1 (en) * 2002-12-18 2006-04-25 Juniper Networks, Inc. Responsive virtual routing system
US20060153200A1 (en) * 2004-12-29 2006-07-13 Clarence Filsfils Automatic prioritization of BGP next-hop in IGP
US20060291399A1 (en) * 2005-06-24 2006-12-28 National Instruments Corporation Signal routing error reporting
US20070091867A1 (en) * 2000-12-22 2007-04-26 Dominique Derou-Madeline Adaptive routing process by deflection with training by reinforcement
US20070115840A1 (en) * 2000-10-17 2007-05-24 Feick Wayne A Method and apparatus for communicating data within measurement traffic
US20080294714A1 (en) * 2007-05-22 2008-11-27 International Business Machines Corporation High Availability Message Transmission
US20080317056A1 (en) * 2007-06-19 2008-12-25 International Business Machines Corporation System, method and program for network routing
US20090049194A1 (en) * 2006-03-31 2009-02-19 Andras Csaszar Updating state in edge routers
US20090080436A1 (en) * 2007-09-26 2009-03-26 Russell White Protection of Transit Links in a Network
US20100195506A1 (en) * 2009-01-30 2010-08-05 At&T Intellectual Property I, L.P. System and Method to Identify a Predicted Oscillatory Behavior of a Router
US7773536B2 (en) 2000-10-17 2010-08-10 Avaya Inc. Method and apparatus for the assessment and optimization of network traffic
US7840704B2 (en) 2000-10-17 2010-11-23 Avaya Inc. Method and apparatus for performance and cost optimization in an internetwork
US20110060844A1 (en) * 2009-09-08 2011-03-10 Nortal Networks Limited Method and Apparatus for Selecting Between Multiple Equal Cost Paths
US20130235757A1 (en) * 2012-03-07 2013-09-12 Samsung Electronics Co. Ltd. Apparatus and method for a biology inspired topological phase transition for wireless sensor network
US8949458B1 (en) * 2003-02-07 2015-02-03 Juniper Networks, Inc. Automatic filtering to prevent network attacks
US20150333983A1 (en) * 2003-03-18 2015-11-19 Dynamic Network Services, Inc. Methods and systems for monitoring network routing
US20160057049A1 (en) * 2000-10-16 2016-02-25 Packet Design, Llc System and method for identifying network topology information in multiple areas
CN105847158A (en) * 2015-01-30 2016-08-10 迈塔斯威士网络有限公司 Processing route data
US9967158B2 (en) 2015-06-05 2018-05-08 Cisco Technology, Inc. Interactive hierarchical network chord diagram for application dependency mapping
US9979615B2 (en) * 2015-06-05 2018-05-22 Cisco Technology, Inc. Techniques for determining network topologies
US10033766B2 (en) 2015-06-05 2018-07-24 Cisco Technology, Inc. Policy-driven compliance
US10089099B2 (en) 2015-06-05 2018-10-02 Cisco Technology, Inc. Automatic software upgrade
US10116559B2 (en) 2015-05-27 2018-10-30 Cisco Technology, Inc. Operations, administration and management (OAM) in overlay data center environments
US10142353B2 (en) 2015-06-05 2018-11-27 Cisco Technology, Inc. System for monitoring and managing datacenters
US10171357B2 (en) 2016-05-27 2019-01-01 Cisco Technology, Inc. Techniques for managing software defined networking controller in-band communications in a data center network
US10177977B1 (en) 2013-02-13 2019-01-08 Cisco Technology, Inc. Deployment and upgrade of network devices in a network environment
US10250446B2 (en) 2017-03-27 2019-04-02 Cisco Technology, Inc. Distributed policy store
US10289438B2 (en) 2016-06-16 2019-05-14 Cisco Technology, Inc. Techniques for coordination of application components deployed on distributed virtual machines
US10374904B2 (en) 2015-05-15 2019-08-06 Cisco Technology, Inc. Diagnostic network visualization
US20190245771A1 (en) * 2016-10-17 2019-08-08 New H3C Technologies Co., Ltd. Transmitting bgp message
US10523541B2 (en) 2017-10-25 2019-12-31 Cisco Technology, Inc. Federated network and application data analytics platform
US10523512B2 (en) 2017-03-24 2019-12-31 Cisco Technology, Inc. Network agent for generating platform specific network policies
US10554501B2 (en) 2017-10-23 2020-02-04 Cisco Technology, Inc. Network migration assistant
US10574575B2 (en) 2018-01-25 2020-02-25 Cisco Technology, Inc. Network flow stitching using middle box flow stitching
US10594560B2 (en) 2017-03-27 2020-03-17 Cisco Technology, Inc. Intent driven network policy platform
US10594542B2 (en) 2017-10-27 2020-03-17 Cisco Technology, Inc. System and method for network root cause analysis
US10680887B2 (en) 2017-07-21 2020-06-09 Cisco Technology, Inc. Remote device status audit and recovery
USRE48065E1 (en) * 2012-05-18 2020-06-23 Dynamic Network Services, Inc. Path reconstruction and interconnection modeling (PRIM)
US10708183B2 (en) 2016-07-21 2020-07-07 Cisco Technology, Inc. System and method of providing segment routing as a service
US10708152B2 (en) 2017-03-23 2020-07-07 Cisco Technology, Inc. Predicting application and network performance
US10764141B2 (en) 2017-03-27 2020-09-01 Cisco Technology, Inc. Network agent for reporting to a network policy system
US10771482B1 (en) * 2017-11-14 2020-09-08 Ca, Inc. Systems and methods for detecting geolocation-aware malware
US10798015B2 (en) 2018-01-25 2020-10-06 Cisco Technology, Inc. Discovery of middleboxes using traffic flow stitching
US10826803B2 (en) 2018-01-25 2020-11-03 Cisco Technology, Inc. Mechanism for facilitating efficient policy updates
US10873593B2 (en) 2018-01-25 2020-12-22 Cisco Technology, Inc. Mechanism for identifying differences between network snapshots
US10873794B2 (en) 2017-03-28 2020-12-22 Cisco Technology, Inc. Flowlet resolution for application performance monitoring and management
US10917438B2 (en) 2018-01-25 2021-02-09 Cisco Technology, Inc. Secure publishing for policy updates
US10931629B2 (en) 2016-05-27 2021-02-23 Cisco Technology, Inc. Techniques for managing software defined networking controller in-band communications in a data center network
US10972388B2 (en) 2016-11-22 2021-04-06 Cisco Technology, Inc. Federated microburst detection
US10999149B2 (en) 2018-01-25 2021-05-04 Cisco Technology, Inc. Automatic configuration discovery based on traffic flow data
US11128700B2 (en) 2018-01-26 2021-09-21 Cisco Technology, Inc. Load balancing configuration based on traffic flow telemetry
US11233821B2 (en) 2018-01-04 2022-01-25 Cisco Technology, Inc. Network intrusion counter-intelligence
US11765046B1 (en) 2018-01-11 2023-09-19 Cisco Technology, Inc. Endpoint cluster assignment and query generation

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100600830B1 (en) * 2001-08-11 2006-07-14 한국전자통신연구원 Adaptive path recovery method through monitoring fault information in MPLS networks
ITTO20020762A1 (en) * 2002-09-02 2004-03-03 Telecom Italia Lab Spa PROCEDURE AND SYSTEM FOR REALIZING CONNECTIVITY ESTIMATES
WO2004045163A1 (en) * 2002-11-12 2004-05-27 Fujitsu Limited Communication network system
US7551634B2 (en) 2002-11-12 2009-06-23 Fujitsu Limited Communication network system
US8023501B1 (en) * 2010-03-15 2011-09-20 Samsung Electronics Co., Ltd. Techniques for self-organizing activity-diffusion-based wireless sensor network
CN109218184B (en) * 2018-08-28 2020-06-30 电子科技大学 Router attribution AS identification method based on port and structure information

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3988587A (en) * 1975-04-14 1976-10-26 Kerr-Mcgee Nuclear Corporation Method and apparatus for indicating the radioactive decay products of radium in an environment
US4656658A (en) * 1985-10-11 1987-04-07 American Telephone And Telegraph Company Network routing arrangement
US4825206A (en) * 1985-11-04 1989-04-25 International Business Machines Corporation Automatic feedback of network topology data
US4972457A (en) * 1989-01-19 1990-11-20 Spectrum Information Technologies, Inc. Portable hybrid communication system and methods
US5398277A (en) * 1992-02-06 1995-03-14 Security Information Network, Inc. Flexible multiprocessor alarm data processing system
EP0817424A2 (en) 1989-06-22 1998-01-07 Digital Equipment Corporation High-speed mesh connected local area network
US5864605A (en) * 1996-08-22 1999-01-26 At&T Corp Voice menu optimization method and system
US5898826A (en) * 1995-11-22 1999-04-27 Intel Corporation Method and apparatus for deadlock-free routing around an unusable routing component in an N-dimensional network
US6055492A (en) * 1997-12-12 2000-04-25 International Business Machines Corporation System and method for providing trace information data reduction
US6115393A (en) * 1991-04-12 2000-09-05 Concord Communications, Inc. Network monitoring
US6453064B1 (en) * 1994-02-28 2002-09-17 Fujitsu Limited Common structure extraction apparatus
US6535518B1 (en) * 2000-02-10 2003-03-18 Simpletech Inc. System for bypassing a server to achieve higher throughput between data network and data storage system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3988587A (en) * 1975-04-14 1976-10-26 Kerr-Mcgee Nuclear Corporation Method and apparatus for indicating the radioactive decay products of radium in an environment
US4656658A (en) * 1985-10-11 1987-04-07 American Telephone And Telegraph Company Network routing arrangement
US4825206A (en) * 1985-11-04 1989-04-25 International Business Machines Corporation Automatic feedback of network topology data
US4972457A (en) * 1989-01-19 1990-11-20 Spectrum Information Technologies, Inc. Portable hybrid communication system and methods
EP0817424A2 (en) 1989-06-22 1998-01-07 Digital Equipment Corporation High-speed mesh connected local area network
US6115393A (en) * 1991-04-12 2000-09-05 Concord Communications, Inc. Network monitoring
US5398277A (en) * 1992-02-06 1995-03-14 Security Information Network, Inc. Flexible multiprocessor alarm data processing system
US6453064B1 (en) * 1994-02-28 2002-09-17 Fujitsu Limited Common structure extraction apparatus
US5898826A (en) * 1995-11-22 1999-04-27 Intel Corporation Method and apparatus for deadlock-free routing around an unusable routing component in an N-dimensional network
US5864605A (en) * 1996-08-22 1999-01-26 At&T Corp Voice menu optimization method and system
US6055492A (en) * 1997-12-12 2000-04-25 International Business Machines Corporation System and method for providing trace information data reduction
US6535518B1 (en) * 2000-02-10 2003-03-18 Simpletech Inc. System for bypassing a server to achieve higher throughput between data network and data storage system

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
B. Halabi, "Internet Routing Architectures," Cisco Press, 1997.
Griffin, T.G. et al., IEEE INFOCOM 2000, "A Safe Path Vector Protocol", pp. 490-499, Mar. 26-30, 2000.
Griffin, T.G. et al., IEEE, "Policy Disputes In Path-Vector Protocols", pp. 21-30, 1999.
J. W. Stewart, "Inter-Domain Routing in the Internet, " BGP4, Addison-Wesley, 1998.
M. G. Gouda, "Elements of Network Protocol Design," John Wiley & Sons, Inc., 1998.
T. G. Griffin and G. T. Wilfong, "An Analysis of BGP Convergent Properties," SIGCOM '99, 1999.
Y. Rekhter and T. Li, "A Border Gateway Protocol," RFC 1771 ( BGP version 4), 1995.

Cited By (175)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6857026B1 (en) * 1999-12-14 2005-02-15 Nortel Networks Limited Using alternate routes for fail-over in a communication network
US6938095B2 (en) * 2000-06-28 2005-08-30 Pluris, Inc. Method and apparatus for establishing and sharing a virtual change notification list among a plurality of peer nodes
US20020165981A1 (en) * 2000-06-28 2002-11-07 Erol Basturk Method and apparatus for establishing and sharing a virtual change notification list among a plurality of peer nodes
US20160057049A1 (en) * 2000-10-16 2016-02-25 Packet Design, Llc System and method for identifying network topology information in multiple areas
US20040205098A1 (en) * 2000-10-17 2004-10-14 Lloyd Michael A. Load optimization
US7840704B2 (en) 2000-10-17 2010-11-23 Avaya Inc. Method and apparatus for performance and cost optimization in an internetwork
US20020184393A1 (en) * 2000-10-17 2002-12-05 Leddy John G. Routing information exchange
US20030161321A1 (en) * 2000-10-17 2003-08-28 Karam Mansour J. Method and apparatus for characterizing the quality of a network path
US7349994B2 (en) * 2000-10-17 2008-03-25 Avaya Technology Corp. Method and apparatus for coordinating routing parameters via a back-channel communication medium
US20020129161A1 (en) * 2000-10-17 2002-09-12 Lloyd Michael A. Systems and methods for robust, real-time measurement of network performance
US20020078223A1 (en) * 2000-10-17 2002-06-20 Baldonado Omar C. Method and apparatus for performance and cost optimization in an internetwork
US20020075813A1 (en) * 2000-10-17 2002-06-20 Baldonado Omar C. Method and apparatus for coordinating routing parameters via a back-channel communication medium
US7773536B2 (en) 2000-10-17 2010-08-10 Avaya Inc. Method and apparatus for the assessment and optimization of network traffic
US7756032B2 (en) 2000-10-17 2010-07-13 Avaya Inc. Method and apparatus for communicating data within measurement traffic
US7720959B2 (en) 2000-10-17 2010-05-18 Avaya Inc. Method and apparatus for characterizing the quality of a network path
US7080161B2 (en) * 2000-10-17 2006-07-18 Avaya Technology Corp. Routing information exchange
US7675868B2 (en) 2000-10-17 2010-03-09 Avaya Inc. Method and apparatus for coordinating routing parameters via a back-channel communication medium
US20090031025A1 (en) * 2000-10-17 2009-01-29 Lloyd Michael A Load optimization
US20070115840A1 (en) * 2000-10-17 2007-05-24 Feick Wayne A Method and apparatus for communicating data within measurement traffic
US20070091867A1 (en) * 2000-12-22 2007-04-26 Dominique Derou-Madeline Adaptive routing process by deflection with training by reinforcement
US8315265B2 (en) * 2000-12-22 2012-11-20 Xantima Llc Adaptive routing process by deflection with training by reinforcement
US20030110230A1 (en) * 2001-12-12 2003-06-12 International Business Machines Corporation Method and system for preserving message order when parallel processing messages
US7240097B2 (en) * 2001-12-12 2007-07-03 International Business Machines Corporation Method and system for preserving message order when parallel processing messages
US7424484B2 (en) * 2002-02-05 2008-09-09 International Business Machines Corporation Path-based ranking of unvisited web pages
US20080313176A1 (en) * 2002-02-05 2008-12-18 International Business Machines Corporation Path-based ranking of unvisited web pages
US20030149694A1 (en) * 2002-02-05 2003-08-07 Ibm Corporation Path-based ranking of unvisited web pages
US7979444B2 (en) 2002-02-05 2011-07-12 International Business Machines Corporation Path-based ranking of unvisited web pages
US8023421B2 (en) 2002-07-25 2011-09-20 Avaya Inc. Method and apparatus for the assessment and optimization of network traffic
US7036051B1 (en) * 2002-12-18 2006-04-25 Juniper Networks, Inc. Responsive virtual routing system
US7318179B1 (en) * 2002-12-18 2008-01-08 Juniper Networks, Inc. Virtual routing system for real-time network applications
US8949458B1 (en) * 2003-02-07 2015-02-03 Juniper Networks, Inc. Automatic filtering to prevent network attacks
US9628354B2 (en) * 2003-03-18 2017-04-18 Dynamic Network Services, Inc. Methods and systems for monitoring network routing
US20150333983A1 (en) * 2003-03-18 2015-11-19 Dynamic Network Services, Inc. Methods and systems for monitoring network routing
US7596811B2 (en) 2004-09-09 2009-09-29 Avaya Inc. Methods and systems for network traffic security
US8051481B2 (en) 2004-09-09 2011-11-01 Avaya Inc. Methods and systems for network traffic security
US20060092841A1 (en) * 2004-09-09 2006-05-04 Avaya Inc. Methods and systems for network traffic security
US7818805B2 (en) 2004-09-09 2010-10-19 Avaya Inc. Methods and systems for network traffic security
US20060072543A1 (en) * 2004-09-09 2006-04-06 Lloyd Michael A Methods of and systems for remote outbound control
US20090031420A1 (en) * 2004-09-09 2009-01-29 Lloyd Michael A Methods and systems for network traffic security
US7436838B2 (en) * 2004-12-29 2008-10-14 Cisco Technology, Inc. Automatic prioritization of BGP next-hop in IGP
US20080320166A1 (en) * 2004-12-29 2008-12-25 Cisco Technology, Inc. Automatic prioritization of bgp next-hop in igp convergence
US20060153200A1 (en) * 2004-12-29 2006-07-13 Clarence Filsfils Automatic prioritization of BGP next-hop in IGP
US8089968B2 (en) 2004-12-29 2012-01-03 Cisco Technology, Inc. Automatic prioritization of BGP next-hop in IGP convergence
US7764619B2 (en) * 2005-06-24 2010-07-27 National Instruments Corporation Signal routing error reporting
US20060291399A1 (en) * 2005-06-24 2006-12-28 National Instruments Corporation Signal routing error reporting
US7849215B2 (en) * 2006-03-31 2010-12-07 Telefonaktiebolaget L M Ericsson (Publ) Updating state in edge routers
US20090049194A1 (en) * 2006-03-31 2009-02-19 Andras Csaszar Updating state in edge routers
US8307114B2 (en) 2007-05-22 2012-11-06 International Business Machines Corporation High availability message transmission
US20080294714A1 (en) * 2007-05-22 2008-11-27 International Business Machines Corporation High Availability Message Transmission
US8468266B2 (en) 2007-05-22 2013-06-18 International Business Machines Corporation High availability message transmission
US8085799B2 (en) 2007-06-19 2011-12-27 International Business Machines Corporation System, method and program for network routing
US20080317056A1 (en) * 2007-06-19 2008-12-25 International Business Machines Corporation System, method and program for network routing
US20090080436A1 (en) * 2007-09-26 2009-03-26 Russell White Protection of Transit Links in a Network
US7821970B2 (en) 2007-09-26 2010-10-26 Cisco Technology, Inc. Protection of transit links in a network
US20100195506A1 (en) * 2009-01-30 2010-08-05 At&T Intellectual Property I, L.P. System and Method to Identify a Predicted Oscillatory Behavior of a Router
US20140286334A1 (en) * 2009-09-08 2014-09-25 Rockstar Consortium Us Lp Method and apparatus for selecting between multiple equal cost paths
US8750820B2 (en) * 2009-09-08 2014-06-10 Rockstar Consortium Us Lp Method and apparatus for selecting between multiple equal cost paths
US20110060844A1 (en) * 2009-09-08 2011-03-10 Nortal Networks Limited Method and Apparatus for Selecting Between Multiple Equal Cost Paths
US20120307832A1 (en) * 2009-09-08 2012-12-06 Rockstar Bidco, LP Method and apparatus for selecting between multiple equal cost paths
US8248925B2 (en) * 2009-09-08 2012-08-21 Rockstar Bidco, LP Method and apparatus for selecting between multiple equal cost paths
US20130235757A1 (en) * 2012-03-07 2013-09-12 Samsung Electronics Co. Ltd. Apparatus and method for a biology inspired topological phase transition for wireless sensor network
USRE48065E1 (en) * 2012-05-18 2020-06-23 Dynamic Network Services, Inc. Path reconstruction and interconnection modeling (PRIM)
US10177977B1 (en) 2013-02-13 2019-01-08 Cisco Technology, Inc. Deployment and upgrade of network devices in a network environment
CN105847158A (en) * 2015-01-30 2016-08-10 迈塔斯威士网络有限公司 Processing route data
CN105847158B (en) * 2015-01-30 2020-09-08 迈塔斯威士网络有限公司 Method and system for processing routing data
US10298493B2 (en) * 2015-01-30 2019-05-21 Metaswitch Networks Ltd Processing route data
US10374904B2 (en) 2015-05-15 2019-08-06 Cisco Technology, Inc. Diagnostic network visualization
US10116559B2 (en) 2015-05-27 2018-10-30 Cisco Technology, Inc. Operations, administration and management (OAM) in overlay data center environments
US10326672B2 (en) 2015-06-05 2019-06-18 Cisco Technology, Inc. MDL-based clustering for application dependency mapping
US11368378B2 (en) 2015-06-05 2022-06-21 Cisco Technology, Inc. Identifying bogon address spaces
US10129117B2 (en) 2015-06-05 2018-11-13 Cisco Technology, Inc. Conditional policies
US10142353B2 (en) 2015-06-05 2018-11-27 Cisco Technology, Inc. System for monitoring and managing datacenters
US11936663B2 (en) 2015-06-05 2024-03-19 Cisco Technology, Inc. System for monitoring and managing datacenters
US10171319B2 (en) 2015-06-05 2019-01-01 Cisco Technology, Inc. Technologies for annotating process and user information for network flows
US10177998B2 (en) 2015-06-05 2019-01-08 Cisco Technology, Inc. Augmenting flow data for improved network monitoring and management
US10116530B2 (en) 2015-06-05 2018-10-30 Cisco Technology, Inc. Technologies for determining sensor deployment characteristics
US10181987B2 (en) 2015-06-05 2019-01-15 Cisco Technology, Inc. High availability of collectors of traffic reported by network sensors
US10230597B2 (en) 2015-06-05 2019-03-12 Cisco Technology, Inc. Optimizations for application dependency mapping
US10243817B2 (en) 2015-06-05 2019-03-26 Cisco Technology, Inc. System and method of assigning reputation scores to hosts
US11924072B2 (en) 2015-06-05 2024-03-05 Cisco Technology, Inc. Technologies for annotating process and user information for network flows
US11924073B2 (en) 2015-06-05 2024-03-05 Cisco Technology, Inc. System and method of assigning reputation scores to hosts
US10089099B2 (en) 2015-06-05 2018-10-02 Cisco Technology, Inc. Automatic software upgrade
US10305757B2 (en) 2015-06-05 2019-05-28 Cisco Technology, Inc. Determining a reputation of a network entity
US10320630B2 (en) 2015-06-05 2019-06-11 Cisco Technology, Inc. Hierarchichal sharding of flows from sensors to collectors
US10326673B2 (en) * 2015-06-05 2019-06-18 Cisco Technology, Inc. Techniques for determining network topologies
US10033766B2 (en) 2015-06-05 2018-07-24 Cisco Technology, Inc. Policy-driven compliance
US10009240B2 (en) 2015-06-05 2018-06-26 Cisco Technology, Inc. System and method of recommending policies that result in particular reputation scores for hosts
US11902122B2 (en) 2015-06-05 2024-02-13 Cisco Technology, Inc. Application monitoring prioritization
US10439904B2 (en) 2015-06-05 2019-10-08 Cisco Technology, Inc. System and method of determining malicious processes
US10454793B2 (en) 2015-06-05 2019-10-22 Cisco Technology, Inc. System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack
US10505828B2 (en) 2015-06-05 2019-12-10 Cisco Technology, Inc. Technologies for managing compromised sensors in virtualized environments
US10505827B2 (en) 2015-06-05 2019-12-10 Cisco Technology, Inc. Creating classifiers for servers and clients in a network
US10516586B2 (en) 2015-06-05 2019-12-24 Cisco Technology, Inc. Identifying bogon address spaces
US10516585B2 (en) 2015-06-05 2019-12-24 Cisco Technology, Inc. System and method for network information mapping and displaying
US11902121B2 (en) 2015-06-05 2024-02-13 Cisco Technology, Inc. System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack
US11902120B2 (en) 2015-06-05 2024-02-13 Cisco Technology, Inc. Synthetic data for determining health of a network security system
US10536357B2 (en) 2015-06-05 2020-01-14 Cisco Technology, Inc. Late data detection in data center
US11894996B2 (en) 2015-06-05 2024-02-06 Cisco Technology, Inc. Technologies for annotating process and user information for network flows
US10567247B2 (en) 2015-06-05 2020-02-18 Cisco Technology, Inc. Intra-datacenter attack detection
US11700190B2 (en) 2015-06-05 2023-07-11 Cisco Technology, Inc. Technologies for annotating process and user information for network flows
US11695659B2 (en) 2015-06-05 2023-07-04 Cisco Technology, Inc. Unique ID generation for sensors
US11637762B2 (en) 2015-06-05 2023-04-25 Cisco Technology, Inc. MDL-based clustering for dependency mapping
US10623284B2 (en) 2015-06-05 2020-04-14 Cisco Technology, Inc. Determining a reputation of a network entity
US10623283B2 (en) 2015-06-05 2020-04-14 Cisco Technology, Inc. Anomaly detection through header field entropy
US10623282B2 (en) 2015-06-05 2020-04-14 Cisco Technology, Inc. System and method of detecting hidden processes by analyzing packet flows
US10659324B2 (en) 2015-06-05 2020-05-19 Cisco Technology, Inc. Application monitoring prioritization
US11601349B2 (en) 2015-06-05 2023-03-07 Cisco Technology, Inc. System and method of detecting hidden processes by analyzing packet flows
US10686804B2 (en) 2015-06-05 2020-06-16 Cisco Technology, Inc. System for monitoring and managing datacenters
US10693749B2 (en) 2015-06-05 2020-06-23 Cisco Technology, Inc. Synthetic data for determining health of a network security system
US9979615B2 (en) * 2015-06-05 2018-05-22 Cisco Technology, Inc. Techniques for determining network topologies
US11528283B2 (en) 2015-06-05 2022-12-13 Cisco Technology, Inc. System for monitoring and managing datacenters
US11522775B2 (en) 2015-06-05 2022-12-06 Cisco Technology, Inc. Application monitoring prioritization
US10728119B2 (en) 2015-06-05 2020-07-28 Cisco Technology, Inc. Cluster discovery via multi-domain fusion for application dependency mapping
US10735283B2 (en) 2015-06-05 2020-08-04 Cisco Technology, Inc. Unique ID generation for sensors
US10742529B2 (en) 2015-06-05 2020-08-11 Cisco Technology, Inc. Hierarchichal sharding of flows from sensors to collectors
US11516098B2 (en) 2015-06-05 2022-11-29 Cisco Technology, Inc. Round trip time (RTT) measurement based upon sequence number
US11502922B2 (en) 2015-06-05 2022-11-15 Cisco Technology, Inc. Technologies for managing compromised sensors in virtualized environments
US9967158B2 (en) 2015-06-05 2018-05-08 Cisco Technology, Inc. Interactive hierarchical network chord diagram for application dependency mapping
US10797973B2 (en) 2015-06-05 2020-10-06 Cisco Technology, Inc. Server-client determination
US11496377B2 (en) 2015-06-05 2022-11-08 Cisco Technology, Inc. Anomaly detection through header field entropy
US10797970B2 (en) 2015-06-05 2020-10-06 Cisco Technology, Inc. Interactive hierarchical network chord diagram for application dependency mapping
US11477097B2 (en) 2015-06-05 2022-10-18 Cisco Technology, Inc. Hierarchichal sharding of flows from sensors to collectors
US10862776B2 (en) 2015-06-05 2020-12-08 Cisco Technology, Inc. System and method of spoof detection
US11431592B2 (en) 2015-06-05 2022-08-30 Cisco Technology, Inc. System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack
US11405291B2 (en) 2015-06-05 2022-08-02 Cisco Technology, Inc. Generate a communication graph using an application dependency mapping (ADM) pipeline
US10116531B2 (en) 2015-06-05 2018-10-30 Cisco Technology, Inc Round trip time (RTT) measurement based upon sequence number
US10904116B2 (en) 2015-06-05 2021-01-26 Cisco Technology, Inc. Policy utilization analysis
US11252060B2 (en) 2015-06-05 2022-02-15 Cisco Technology, Inc. Data center traffic analytics synchronization
US11252058B2 (en) 2015-06-05 2022-02-15 Cisco Technology, Inc. System and method for user optimized application dependency mapping
US10917319B2 (en) 2015-06-05 2021-02-09 Cisco Technology, Inc. MDL-based clustering for dependency mapping
US11153184B2 (en) 2015-06-05 2021-10-19 Cisco Technology, Inc. Technologies for annotating process and user information for network flows
US11128552B2 (en) 2015-06-05 2021-09-21 Cisco Technology, Inc. Round trip time (RTT) measurement based upon sequence number
US10979322B2 (en) 2015-06-05 2021-04-13 Cisco Technology, Inc. Techniques for determining network anomalies in data center networks
US11121948B2 (en) 2015-06-05 2021-09-14 Cisco Technology, Inc. Auto update of sensor configuration
US11102093B2 (en) 2015-06-05 2021-08-24 Cisco Technology, Inc. System and method of assigning reputation scores to hosts
US11546288B2 (en) 2016-05-27 2023-01-03 Cisco Technology, Inc. Techniques for managing software defined networking controller in-band communications in a data center network
US10171357B2 (en) 2016-05-27 2019-01-01 Cisco Technology, Inc. Techniques for managing software defined networking controller in-band communications in a data center network
US10931629B2 (en) 2016-05-27 2021-02-23 Cisco Technology, Inc. Techniques for managing software defined networking controller in-band communications in a data center network
US10289438B2 (en) 2016-06-16 2019-05-14 Cisco Technology, Inc. Techniques for coordination of application components deployed on distributed virtual machines
US10708183B2 (en) 2016-07-21 2020-07-07 Cisco Technology, Inc. System and method of providing segment routing as a service
US11283712B2 (en) 2016-07-21 2022-03-22 Cisco Technology, Inc. System and method of providing segment routing as a service
US10862792B2 (en) * 2016-10-17 2020-12-08 New H3C Technologies Co., Ltd. Transmitting BGP message
US20190245771A1 (en) * 2016-10-17 2019-08-08 New H3C Technologies Co., Ltd. Transmitting bgp message
US10972388B2 (en) 2016-11-22 2021-04-06 Cisco Technology, Inc. Federated microburst detection
US10708152B2 (en) 2017-03-23 2020-07-07 Cisco Technology, Inc. Predicting application and network performance
US11088929B2 (en) 2017-03-23 2021-08-10 Cisco Technology, Inc. Predicting application and network performance
US10523512B2 (en) 2017-03-24 2019-12-31 Cisco Technology, Inc. Network agent for generating platform specific network policies
US11252038B2 (en) 2017-03-24 2022-02-15 Cisco Technology, Inc. Network agent for generating platform specific network policies
US10764141B2 (en) 2017-03-27 2020-09-01 Cisco Technology, Inc. Network agent for reporting to a network policy system
US11509535B2 (en) 2017-03-27 2022-11-22 Cisco Technology, Inc. Network agent for reporting to a network policy system
US11146454B2 (en) 2017-03-27 2021-10-12 Cisco Technology, Inc. Intent driven network policy platform
US10594560B2 (en) 2017-03-27 2020-03-17 Cisco Technology, Inc. Intent driven network policy platform
US10250446B2 (en) 2017-03-27 2019-04-02 Cisco Technology, Inc. Distributed policy store
US11683618B2 (en) 2017-03-28 2023-06-20 Cisco Technology, Inc. Application performance monitoring and management platform with anomalous flowlet resolution
US11863921B2 (en) 2017-03-28 2024-01-02 Cisco Technology, Inc. Application performance monitoring and management platform with anomalous flowlet resolution
US10873794B2 (en) 2017-03-28 2020-12-22 Cisco Technology, Inc. Flowlet resolution for application performance monitoring and management
US11202132B2 (en) 2017-03-28 2021-12-14 Cisco Technology, Inc. Application performance monitoring and management platform with anomalous flowlet resolution
US10680887B2 (en) 2017-07-21 2020-06-09 Cisco Technology, Inc. Remote device status audit and recovery
US11044170B2 (en) 2017-10-23 2021-06-22 Cisco Technology, Inc. Network migration assistant
US10554501B2 (en) 2017-10-23 2020-02-04 Cisco Technology, Inc. Network migration assistant
US10523541B2 (en) 2017-10-25 2019-12-31 Cisco Technology, Inc. Federated network and application data analytics platform
US10594542B2 (en) 2017-10-27 2020-03-17 Cisco Technology, Inc. System and method for network root cause analysis
US10904071B2 (en) 2017-10-27 2021-01-26 Cisco Technology, Inc. System and method for network root cause analysis
US10771482B1 (en) * 2017-11-14 2020-09-08 Ca, Inc. Systems and methods for detecting geolocation-aware malware
US11233821B2 (en) 2018-01-04 2022-01-25 Cisco Technology, Inc. Network intrusion counter-intelligence
US11750653B2 (en) 2018-01-04 2023-09-05 Cisco Technology, Inc. Network intrusion counter-intelligence
US11765046B1 (en) 2018-01-11 2023-09-19 Cisco Technology, Inc. Endpoint cluster assignment and query generation
US10574575B2 (en) 2018-01-25 2020-02-25 Cisco Technology, Inc. Network flow stitching using middle box flow stitching
US10798015B2 (en) 2018-01-25 2020-10-06 Cisco Technology, Inc. Discovery of middleboxes using traffic flow stitching
US10826803B2 (en) 2018-01-25 2020-11-03 Cisco Technology, Inc. Mechanism for facilitating efficient policy updates
US10873593B2 (en) 2018-01-25 2020-12-22 Cisco Technology, Inc. Mechanism for identifying differences between network snapshots
US10917438B2 (en) 2018-01-25 2021-02-09 Cisco Technology, Inc. Secure publishing for policy updates
US11924240B2 (en) 2018-01-25 2024-03-05 Cisco Technology, Inc. Mechanism for identifying differences between network snapshots
US10999149B2 (en) 2018-01-25 2021-05-04 Cisco Technology, Inc. Automatic configuration discovery based on traffic flow data
US11128700B2 (en) 2018-01-26 2021-09-21 Cisco Technology, Inc. Load balancing configuration based on traffic flow telemetry

Also Published As

Publication number Publication date
CA2324837A1 (en) 2001-06-01
KR20010070255A (en) 2001-07-25
EP1104963A1 (en) 2001-06-06
JP2001197105A (en) 2001-07-19

Similar Documents

Publication Publication Date Title
US6728779B1 (en) Method and apparatus for exchanging routing information in a packet-based data network
US7180864B2 (en) Method and apparatus for exchanging routing information within an autonomous system in a packet-based data network
US10666563B2 (en) Buffer-less virtual routing
US6584071B1 (en) Routing with service level guarantees between ingress-egress points in a packet network
US7978708B2 (en) Automatic route tagging of BGP next-hop routes in IGP
AU2004308327B2 (en) System and method for distributing route selection in an implementation of a routing protocol
JP3115769B2 (en) How to assign metric values to each link in the network
US6567380B1 (en) Technique for selective routing updates
US7319700B1 (en) Communicating constraint information for determining a path subject to such constraints
US7123620B1 (en) Apparatus and method for scalable and dynamic traffic engineering in a data communication network
US6147971A (en) Optimized routing method based on minimal hop count for use in PNNI based asynchronous transfer mode networks
US7197040B2 (en) System and method for optimally configuring border gateway selection for transit traffic flows in a computer network
US8493869B2 (en) Distributed constraints-based inter-domain network traffic management
CN113347091B (en) Flexible algorithm aware border gateway protocol prefix segment route identifier
EP3073684A1 (en) Path weighted equal-cost multipath
US6614762B1 (en) PNNI topology abstraction
US20010017845A1 (en) Restrictive costs in network systems
WO2012038722A1 (en) Admission control in a self aware network
US8811226B2 (en) Management of routing topology in a network
US20040233850A1 (en) Device and a method for determining routing paths in a communication network in the presence of selection attributes
CN111865787A (en) Traffic statistical method, network equipment and storage medium
KR100875911B1 (en) Method and device for updating link status information
WO2010112802A1 (en) Routing traffic in a communications network
US8737406B1 (en) Method for transmitting IP routes to prioritize convergence
AU7181300A (en) Method and apparatus for exchanging routing information in packet-based data network

Legal Events

Date Code Title Description
AS Assignment

Owner name: LUCENT TECHNOLOGIES, INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GRIFFIN, TIMOTHY G.;WILFONG, GORDON THOMAS;REEL/FRAME:011152/0003;SIGNING DATES FROM 20000822 TO 20000830

AS Assignment

Owner name: THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT, TEX

Free format text: CONDITIONAL ASSIGNMENT OF AND SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:LUCENT TECHNOLOGIES INC. (DE CORPORATION);REEL/FRAME:011722/0048

Effective date: 20010222

AS Assignment

Owner name: JPMORGAN CHASE BANK, AS COLLATERAL AGENT, TEXAS

Free format text: SECURITY INTEREST;ASSIGNOR:LUCENT TECHNOLOGIES INC.;REEL/FRAME:014419/0630

Effective date: 20030528

AS Assignment

Owner name: LUCENT TECHNOLOGIES INC., NEW JERSEY

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (FORMERLY KNOWN AS THE CHASE MANHATTAN BANK), AS ADMINISTRATIVE AGENT;REEL/FRAME:018590/0287

Effective date: 20061130

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: LUCENT TECHNOLOGIES INC., NEW JERSEY

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:JPMORGAN CHASE BANK, N.A. (FORMERLY KNOWN AS THE CHASE MANHATTAN BANK), AS ADMINISTRATIVE AGENT;REEL/FRAME:018590/0896

Effective date: 20061130

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: CREDIT SUISSE AG, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:ALCATEL-LUCENT USA INC.;REEL/FRAME:030510/0627

Effective date: 20130130

AS Assignment

Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:033950/0001

Effective date: 20140819

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20160427